Towards Automatic Verification of Authentication Protocols on an Unbounded Network.
Heather, J and Schneider, S (2000) Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW'00 . 132 - 143.
Schneider's (1998) work on rank functions provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only with a protocol running on a small network; and no help is given with the somewhat hit-and-miss process of finding the rank function which underpins the central theorem.
In this paper, we develop the theory to allow for an arbitrarily large network, and give a clearly defined decision procedure by which one may either construct a rank function, proving correctness of the protocol, or show that no rank function exists.
We discuss the implications of the absence of a rank function, and the open question of completeness of the rank function theorem.
|Divisions:||Faculty of Engineering and Physical Sciences > Computing Science|
|Deposited By:||Mr Adam Field|
|Deposited On:||27 May 2010 15:46|
|Last Modified:||16 Feb 2013 16:10|
Repository Staff Only: item control page