Sciweavers

ISICT
2003

On the automated implementation of modal logics used to verify security protocols

13 years 5 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application of formal techniques is highly involved, software has been developed in order to facilitate protocol verification. Protocol weaknesses or flaws can thus be identified and corrected during the design process. In this paper the verification process is illustrated by analysing the ASK protocol using the tool AAPA2. The virtues and limitations of the tool are discussed. Overall, the analysis shows that the use of automated tools in verifying security protocols offers significant advantages to the protocol designer.
Tom Coffey, Reiner Dojen, Tomas Flanagan
Added 31 Oct 2010
Updated 31 Oct 2010
Type Conference
Year 2003
Where ISICT
Authors Tom Coffey, Reiner Dojen, Tomas Flanagan
Comments (0)