A Comparative Analysis of Tools for Verification of Security…

A Comparative Analysis of Tools for Verification of Security...

1. Introduction A protocol is a set of rules that followed the defined conventions to establish semantically correct communications between the participating entities. A security protocol is an ordinary communication protocol in which the message exchanged is often encrypted using the defined cryptographic mechanisms. The mechanisms Symmetric Key Cryptography or Asymmetric Key Cryptography are used to obtain various cryptographic attributes such as Confidentiality, Entity Authentication, Message Integrity, Non-repudiation, Message Freshness, to name a few [1]. However, merely using cryptographic mechanisms, does not guarantee security-wise semantically secure operation of the protocol, even if it is correct. There indeed have been reported breaches in the security protocols, after being published and accepted as a safe protocol [2-4]. In such a scenario, in case of the ordinary communication protocols, recourse has been taken to the rigorous verification of the same using appropriate tool for the domain. As for example, the protocol verifier SPIN is used to verify the communication protocols for distributed software [5].

Download Now Read Online

Similar Free eBook

Recent Trends In Network Security And Applications


Recent Trends In Network Security And Applications Download Now Read Online

Author by : Natarajan Meghanathan
Languange Used : en
Release Date : 2010-07-07
Publisher by : Springer Science & Business Media






Foundations And Practice Of Security


Foundations And Practice Of Security Download Now Read Online

Author by : Joaquin Garcia-Alfaro
Languange Used : en
Release Date : 2016-02-24
Publisher by : Springer






Integrated Formal Methods


Integrated Formal Methods Download Now Read Online

Author by : Nadia Polikarpova
Languange Used : en
Release Date : 2017-10-01
Publisher by : Springer






Formal Aspects In Security And Trust


Formal Aspects In Security And Trust Download Now Read Online

Author by : Pierpaolo Degano
Languange Used : en
Release Date : 2010-04-29
Publisher by : Springer






A Comparative Study Of Formal Verification Techniques For Authentication Protocols


A Comparative Study Of Formal Verification Techniques For Authentication Protocols Download Now Read Online

Author by : Hernan Miguel Palombo
Languange Used : en
Release Date : 2015
Publisher by :






Providing For National Security


Providing For National Security Download Now Read Online

Author by : Andrew M. Dorman
Languange Used : en
Release Date : 2014-04-30
Publisher by : Stanford University Press






Formal Methods For Safety And Security


Formal Methods For Safety And Security Download Now Read Online

Author by : Manju Nanda
Languange Used : en
Release Date : 2017-11-09
Publisher by : Springer






Information Security And Ethics


Information Security And Ethics Download Now Read Online

Author by : Hamid R. Nemati
Languange Used : en
Release Date : 2008
Publisher by :






Data Engineering And Applications


Data Engineering And Applications Download Now Read Online

Author by : Rajesh Kumar Shukla
Languange Used : en
Release Date : 2019-04-24
Publisher by : Springer






Router Security Strategies


Router Security Strategies Download Now Read Online

Author by : Gregg Schudel
Languange Used : en
Release Date : 2007-12-29
Publisher by : Pearson Education






Leave a Reply

Your email address will not be published. Required fields are marked *