Boreale, Michele and Buscemi, Maria Grazia Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation. In: Proceedings of the 28th International Symposium on Mathematical Foundations of Computer Science (MFCS ’03). Lecture Notes in Computer Science, 2747 . Springer, pp. 269-278. ISBN 3-540-40671-9 (2003)
Full text not available from this repository.Abstract
Automatic methods developed so far for analysis of security protocols only model a limited set of cryptographic primitives (often, only encryption and concatenation) and from low-level features of cryptographic algorithms. This paper is an attempt towards closing this gap. We propose a symbolic technique and a decision method for analysis of protocols based on modular exponentiation, such as Diffie-Hellman key exchange. We introduce a protocol description language along with its semantics. Then, we propose a notion of symbolic execution and, based on it, a verification method. We prove that the method is sound and complete with respect to the language semantics.
Item Type: | Book Section |
---|---|
Identification Number: | https://doi.org/10.1007/978-3-540-45138-9_21 |
Additional Information: | The final publication is available at www.springerlink.com |
Funders: | This work has been partially supported by EU within the FET - Global Computing initiative, projects MIKADO and PROFUNDIS and by MIUR project NAPOLI. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Research Area: | Computer Science and Applications |
Depositing User: | Users 29 not found. |
Date Deposited: | 01 Mar 2011 10:03 |
Last Modified: | 11 Jul 2011 14:33 |
URI: | http://eprints.imtlucca.it/id/eprint/130 |
Actions (login required)
Edit Item |