Information Security Applications
Author(s) -
Kijoon Chae,
Moti Yung
Publication year - 2004
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
DOI - 10.1007/b95188
Subject(s) - computer science , information security , computer security , cryptography , government (linguistics) , philosophy , linguistics
Security protocols are very vulnerable to design errors. Thus many techniques have been proposed for validating the correctness of security protocols. Among these, general model checking is one of the preferred methods. Using tools such as Murφ, model checking can be performed automatically. Thus protocol designers can use it even if they are not proficient in formal techniques. Although this is an attractive approach, state space explosion prohibits model checkers from validating secure protocols with a significant number of communicating participants. In this paper, we propose “model checking with pre-configuration” which is a “divide-and-conquer” approach that reduces the amount of memory needed for verification. The verification time is also reduced since the method permits the use of symmetry more effectively in model checking. The performance of the method is shown by checking the NeedhamSchroeder-Lowe Public-Key protocol using Murφ.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom