Operational semantics and verification of security protocols. (Q610283)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Operational semantics and verification of security protocols. |
scientific article |
Statements
Operational semantics and verification of security protocols. (English)
0 references
8 December 2010
0 references
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, an execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions or correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model a tool set called Scyther has been developed that can automatically find attacks on security protocols or prove their correctness. Case studies show the application of the methodology as well as the effectiveness of the analysis tool. The methodology's strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make this book suited both for researchers and graduate students of information security and for advanced professionals designing critical security protocols.
0 references
security protocols
0 references
operational semantics of security protocols
0 references
verification of security protocols
0 references