University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Verifying authentication protocols in CSP

Schneider, Steve A. (1998) Verifying authentication protocols in CSP IEEE Transactions on Software Engineering, 24 (9). pp. 741-758.


Download (380kB)


This paper presents a general approach for analysis and verification of authentication properties using the theory of Communicating Sequential Processes (CSP). The paper aims to develop a specific theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such protocols in a natural and precise way with the ability to reason formally about the properties they exhibit. The theory is illustrated by an examination of the Needham-Schroeder Public-Key protocol. The protocol is first examined with respect to a single run and then more generally with respect to multiple concurrent runs.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
Schneider, Steve
Date : 1 September 1998
DOI : 10.1109/32.713329
Copyright Disclaimer : © 1998 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Uncontrolled Keywords : Authentication, security protocols, formal methods, CSP, verification, Needham-Schroeder protocol
Depositing User : Mr Adam Field
Date Deposited : 27 May 2010 14:46
Last Modified : 16 Jan 2019 16:23

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800