Skip to Main content Skip to Navigation
New interface
Conference papers

Verification of Security Protocols

Véronique Cortier 1 
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Security protocols are short programs aiming at securing communications over a network. They are widely used in our everyday life. They may achieve various goals depending on the application: confidentiality, authenticity, privacy, anonymity, fairness, etc. Their verification using symbolic models has shown its interest for detecting attacks and proving security properties. A famous example is the Needham-Schroeder protocol [23] on which G. Lowe discovered a flaw 17 years after its publication [20]. Secrecy preservation has been proved to be co-NPcomplete for a bounded number of sessions [24], and decidable for an unbounded number of sessions under some additional restrictions (e.g. [3,12,13,25]). Many tools have also been developed to automatically verify cryptographic protocols like [8,21].
Document type :
Conference papers
Complete list of metadata
Contributor : Véronique Cortier Connect in order to contact the contributor
Submitted on : Tuesday, October 27, 2009 - 4:25:28 PM
Last modification on : Friday, January 21, 2022 - 3:09:37 AM

Links full text



Véronique Cortier. Verification of Security Protocols. 10th Conference on Verification, Model Checking, and Abstract Interpretation - VMCAI'09, Jan 2009, Savannah, United States. pp.5-13, ⟨10.1007/978-3-540-93900-9_5⟩. ⟨inria-00426764⟩



Record views