Automatic Verification of Security Protocols - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2004

Automatic Verification of Security Protocols

Résumé

Internet is becoming everyday a more widely used medium for electronic commerce. This development is hampered by the natural insecurity of communications, as it is not possible to guarantee that some data exchanged is not listened by someone else, or even that it really originated from the claimed sender. This lack of security leads to the development of security protocols, that is small messages sequences, after which the author provides some properties to the user, such as the correct identification of the users (called agents) and the privacy of some data pieces. There has been a significant amount of work toward the specification of security protocols and the search for attacks, but much less toward the positive verification of protocol properties. After a quick overview of the main techniques developped for considering these three levels, we will focus on some recent ones that are based on constraint solving and unification. They combine several different problems, such as unification and matching in some theories, reachability problems, deduction, and all this in the context of the properties of cryptographic primitives.
Fichier non déposé

Dates et versions

inria-00100032 , version 1 (26-09-2006)

Identifiants

  • HAL Id : inria-00100032 , version 1

Citer

Laurent Vigneron. Automatic Verification of Security Protocols. 18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 2 p. ⟨inria-00100032⟩
135 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More