z-logo
open-access-imgOpen Access
Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
Author(s) -
Véronique Cortier,
Steve Kremer
Publication year - 2014
Publication title -
foundations and trends® in programming languages
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.272
H-Index - 9
eISSN - 2325-1131
pISSN - 2325-1107
DOI - 10.1561/2500000001
Subject(s) - computer science , computer security , cryptographic protocol , adversary , cryptography , computer security model , payment , model checking , formal methods , formal verification , adversary model , protocol (science) , theoretical computer science , software engineering , world wide web , medicine , alternative medicine , pathology
International audienceSecurity protocols are distributed programs that aim at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking and more recently electronic elections. Given The financial and societal impact in case of failure, and the long history of design flaws in such protocol, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. The aim of this paper is to provide a tutorial to some modern approaches for formally modeling protocols, their goals and automatically verifying them

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom