Formal methods for assuring security of protocols

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

Establishing the security of a system is an intricate problem with subtle nuances: it requires a careful examination of the underlying assumptions, abstractions, and possible actions. Consequently, assuring that a system behaves securely is virtually impossible without the use of rigorous analytical techniques. In this article, we focus on a single cryptographic protocol (Needham-Schroeder) and show several different formal methods can be used to identify its various vulnerabilities. These vulnerabilities include susceptibility to freshness attacks and impersonations.

Original languageEnglish (US)
Pages (from-to)46-54
Number of pages9
JournalComputer Journal
Volume45
Issue number1
DOIs
StatePublished - 2002

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Formal methods for assuring security of protocols'. Together they form a unique fingerprint.

Cite this