A Comparative Analysis of Tools for Verification of Security…

A Comparative Analysis of Tools for Verification of Security...

1. Introduction A protocol is a set of rules that followed the defined conventions to establish semantically correct communications between the participating entities. A security protocol is an ordinary communication protocol in which the message exchanged is often encrypted using the defined cryptographic mechanisms. The mechanisms Symmetric Key Cryptography or Asymmetric Key Cryptography are used to obtain various cryptographic attributes such as Confidentiality, Entity Authentication, Message Integrity, Non-repudiation, Message Freshness, to name a few [1]. However, merely using cryptographic mechanisms, does not guarantee security-wise semantically secure operation of the protocol, even if it is correct. There indeed have been reported breaches in the security protocols, after being published and accepted as a safe protocol [2-4]. In such a scenario, in case of the ordinary communication protocols, recourse has been taken to the rigorous verification of the same using appropriate tool for the domain. As for example, the protocol verifier SPIN is used to verify the communication protocols for distributed software [5].

Download Now Read Online


Here is Download Link

Recent Trends In Network Security And Applications


Recent Trends In Network Security And Applications Download Now Read Online

Author by : Natarajan Meghanathan
Languange Used : en
Release Date : 2010-07-07
Publisher by : Springer Science & Business Media






Foundations And Practice Of Security


Foundations And Practice Of Security Download Now Read Online

Author by : Joaquin Garcia-Alfaro
Languange Used : en
Release Date : 2016-02-24
Publisher by : Springer






Integrated Formal Methods


Integrated Formal Methods Download Now Read Online

Author by : Nadia Polikarpova
Languange Used : en
Release Date : 2017-10-01
Publisher by : Springer






Formal Aspects In Security And Trust


Formal Aspects In Security And Trust Download Now Read Online

Author by : Pierpaolo Degano
Languange Used : en
Release Date : 2010-04-29
Publisher by : Springer






A Comparative Study Of Formal Verification Techniques For Authentication Protocols


A Comparative Study Of Formal Verification Techniques For Authentication Protocols Download Now Read Online

Author by : Hernan Miguel Palombo
Languange Used : en
Release Date : 2015
Publisher by :






Information Security And Ethics


Information Security And Ethics Download Now Read Online

Author by : Hamid R. Nemati
Languange Used : en
Release Date : 2007-08-01
Publisher by : Information Science Publishing






Formal To Practical Security


Formal To Practical Security Download Now Read Online

Author by : Véronique Cortier
Languange Used : en
Release Date : 2009-05-25
Publisher by : Springer Science & Business Media






Air Transport Security


Air Transport Security Download Now Read Online

Author by : Joseph S. Szyliowicz
Languange Used : en
Release Date : 2018-08-31
Publisher by : Edward Elgar Publishing






Non Proliferation Arms Control And Disarmament


Non Proliferation Arms Control And Disarmament Download Now Read Online

Author by : Peter Gizewski
Languange Used : en
Release Date : 1998
Publisher by : Centre for International and Security Studies York Univers






Diplomatic Security


Diplomatic Security Download Now Read Online

Author by : Eugenio Cusumano
Languange Used : en
Release Date : 2019-04-23
Publisher by : Stanford University Press






Leave a Reply

Your email address will not be published. Required fields are marked *