# The CL-Atse Protocol Analyser

1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : We present a symbolic analysis of the ephemerizer's protocol by Radia Perlman, using the CL-Atse tool from the AVISPA's toolsuite. This protocol allows transmitting a data that will disappear'' (i.e. cannot be retrieved) after a certain time. We show that this protocol is secured for this property plus the secrecy of the data, but is trivially non secured for it's integrity. Therefore, we present two extensions of this protocol, one natural and probably already done in practice, the other one much less obvious. We shows that while the first extension guaranty the basic integrity property under certain conditions, the second one is much stronger and even allows faster computations.
Type de document :
Communication dans un congrès
Frank Pfenning. 17th International Conference on Term Rewriting and Applications - RTA 2006, Aug 2006, Seattle, WA/USA, Springer, 4098, pp.277--286, 2006, Lecture Notes in Computer Science
Liste complète des métadonnées

Littérature citée [16 références]

https://hal.inria.fr/inria-00103573
Contributeur : Mathieu Turuani <>
Soumis le : mercredi 4 octobre 2006 - 16:56:26
Dernière modification le : vendredi 6 juillet 2018 - 15:06:09
Document(s) archivé(s) le : mardi 6 avril 2010 - 18:12:36

### Identifiants

• HAL Id : inria-00103573, version 1

### Citation

Mathieu Turuani. The CL-Atse Protocol Analyser. Frank Pfenning. 17th International Conference on Term Rewriting and Applications - RTA 2006, Aug 2006, Seattle, WA/USA, Springer, 4098, pp.277--286, 2006, Lecture Notes in Computer Science. 〈inria-00103573〉

### Métriques

Consultations de la notice

## 240

Téléchargements de fichiers