Audiobook
We may earn a commission. Learn more.
Mechanized Proofs of Security Protocols Needham-Schroeder with Public Keys
Abstract: "The inductive approach to verifying security protocols, previously applied to shared-key encryption, is here applied to the public key version of the Needham-Schroeder protocol. As before, mechanized proofs are performed using Isabelle/HOL. Both the original, flawed version and Lowe's improved version are studied; the properties proved highlight the distinctions between the two versions. The results are compared with previous analyses of the same protocol. The analysis reported below required only 30 hours of the author's time. The proof scripts execute in under three mintues."
No reviews yet.
Be the first to write one.
No highlights yet.
Be the first to share one.