Boreale, Michele and Buscemi, Maria Grazia Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation. In: Proceedings of the 28th International Symposium on Mathematical Foundations of Computer Science (MFCS ’03). Lecture Notes in Computer Science, 2747 . Springer, pp. 269-278. ISBN 3-540-40671-9 (2003)Full text not available from this repository.
Automatic methods developed so far for analysis of security protocols only model a limited set of cryptographic primitives (often, only encryption and concatenation) and from low-level features of cryptographic algorithms. This paper is an attempt towards closing this gap. We propose a symbolic technique and a decision method for analysis of protocols based on modular exponentiation, such as Diffie-Hellman key exchange. We introduce a protocol description language along with its semantics. Then, we propose a notion of symbolic execution and, based on it, a verification method. We prove that the method is sound and complete with respect to the language semantics.
|Item Type:||Book Section|
|Additional Information:||The final publication is available at www.springerlink.com|
|Funders:||This work has been partially supported by EU within the FET - Global Computing initiative, projects MIKADO and PROFUNDIS and by MIUR project NAPOLI.|
|Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
|Research Area:||Computer Science and Applications|
|Depositing User:||Users 29 not found.|
|Date Deposited:||01 Mar 2011 10:03|
|Last Modified:||11 Jul 2011 14:33|
Actions (login required)