Authors
Michele Boreale, Maria Grazia Buscemi
Publication date
2002/8/20
Book
International Conference on Concurrency Theory
Pages
483-498
Publisher
Springer Berlin Heidelberg
Description
Properties of security protocols such as authentication and secrecy are often verified by explictly generating an operational model of the protocol and then seeking for insecure states. However, message exchange between the intruder and the honest participants induces a form of state explosion that makes the model infinite in principle. Building on previous work on symbolic semantics, we propose a general framework for automatic analysis of security protocols that make use of a variety of crypto-functions. We start from a base language akin to the spi-calculus, equipped with a set of generic cryptographic primitives. We propose a symbolic operational semantics that relies on unification and provides finite and effective protocol models. Next, we give a method to carry out trace analysis directly on the symbolic model. Under certain conditions on the given cryptographic primitives, our method is proven …
Total citations
2002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202421231366453111111
Scholar articles
M Boreale, MG Buscemi - International Conference on Concurrency Theory, 2002