Back to Search
Start Over
Modeling security properties of authentication of cryptographic protocols using spin formal verification
- Source :
- Informatization and communication. :21-25
- Publication Year :
- 2020
- Publisher :
- Informatization and Communication Journal Editorial Board, 2020.
-
Abstract
- To assess the quality and security of cryptographic protocols, we use various formal verification tools, such as Scyther tool, Avispa, ProVerif. these formal verifiers can check the protocol for vulnerability to attacks on secrecy and authentication, as these are the most prevalent attacks on protocols. However, this is not enough to fully analyze the security of the protocol. In this article, we will use linear temporal logic (LTL) model checking with SPIN. This tool, unlike the formal verifiers listed above, is not designed for a specific application in the context of cryptographic protocols; however, it has a very wide range of possibilities. In particular, for each security property, it is possible to describe the behavior of an attacker and test for the stability of the protocol model to its various attacks. The purpose of this work is to describe the developed methodology for verifying the security of authentication properties using the SPIN verifier.
Details
- ISSN :
- 20788320
- Database :
- OpenAIRE
- Journal :
- Informatization and communication
- Accession number :
- edsair.doi...........aa2fd3383f4a1dca79f1ce68d5bc7b91
- Full Text :
- https://doi.org/10.34219/2078-8320-2020-11-3-21-25