Skip to Main content Skip to Navigation
New interface
Journal articles

Formal Models and Techniques for Analyzing Security Protocols: A Tutorial

Véronique Cortier 1 Steve Kremer 1 
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Security protocols are distributed programs that aim at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking and more recently electronic elections. Given The financial and societal impact in case of failure, and the long history of design flaws in such protocol, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. The aim of this paper is to provide a tutorial to some modern approaches for formally modeling protocols, their goals and automatically verifying them.
Document type :
Journal articles
Complete list of metadata

Cited literature [116 references]  Display  Hide  Download
Contributor : Steve Kremer Connect in order to contact the contributor
Submitted on : Tuesday, October 13, 2015 - 3:00:16 PM
Last modification on : Friday, January 21, 2022 - 3:09:00 AM
Long-term archiving on: : Thursday, April 27, 2017 - 12:28:45 AM


Files produced by the author(s)



Véronique Cortier, Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. Foundations and Trends in Programming Languages, 2014, 1 (3), pp.117. ⟨10.1561/2500000001⟩. ⟨hal-01090874⟩



Record views


Files downloads