Sciweavers

ASM
2008
ASM

Modelling Attacker's Knowledge for Cascade Cryptographic Protocols

13 years 6 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocols requires precise modelling of the attacker's knowledge. In this paper we use the event B modelling language to model the knowledge of the attacker for a class of cryptographic protocols called cascade protocols. The attacker's behaviour conforms to the Dolev-Yao model. In the Dolev-Yao model, the attacker has full control of the communication channel, and the cryptographic primitives are supposed to be perfect. key-words: cryptography, model for attacker, formal methods
Nazim Benassa
Added 12 Oct 2010
Updated 12 Oct 2010
Type Conference
Year 2008
Where ASM
Authors Nazim Benassa
Comments (0)