咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A Comparative Analysis of Tool... 收藏

A Comparative Analysis of Tools for Verification of Security Protocols

A Comparative Analysis of Tools for Verification of Security Protocols

作     者:Nitish Dalal Jenny Shah Khushboo Hisaria Devesh Jinwala 

作者机构:不详 

出 版 物:《International Journal of Communications, Network and System Sciences》 (通讯、网络与系统学国际期刊(英文))

年 卷 期:2010年第3卷第10期

页      面:779-787页

学科分类:1002[医学-临床医学] 100214[医学-肿瘤学] 10[医学] 

主  题:Formal Verification Security Protocols Attacks 

摘      要:The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have indeed helped correct the protocols even after being standardized. However, the standard protocol verification tools and techniques do not verify the security properties of a cryptographic protocol. This has resulted in the emergence of the security protocol verifiers to fill the need. In this paper, taking the two popular security verification tools namely Scyther and ProVerif as the basis, we identify a few security protocols and implement them in both Scyther and ProVerif, to aptly evaluate the tools, in terms of the security properties of the selected protocols. In the process, we not only characteristically present a comparative evaluation of the two tools, but also reveal interesting security properties of the protocols selected, showing their strengths and weaknesses. To the best of our knowledge, this is a unique attempt to juxtapose and evaluate the two verification tools using the selected security protocols.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分