University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Verifying Security Protocols: An Application of CSP.

Schneider, SA and Delicata, R (2004) Verifying Security Protocols: An Application of CSP. In: Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, 2004-07-07 - 2004-07-08, London.

Available under License : See the attached licence file.

Download (287kB)
[img] Text (licence)

Download (1kB)


The field of protocol analysis is one area in which CSP has proven particularly successful, and several techniques have been proposed that use CSP to reason about security properties such as confidentiality and authentication. In this paper we describe one such approach, based on theorem-proving, that uses the idea of a rank function to establish the correctness of protocols. This description is motivated by the consideration of a simple, but flawed, authentication protocol. We show how a rank function analysis can be used to locate this flaw and prove that a modified version of the protocol is correct.

Item Type: Conference or Workshop Item (Conference Paper)
Divisions : Faculty of Engineering and Physical Sciences > Computer Science
Authors : Schneider, SA and Delicata, R
Date : 2004
DOI : 10.1007/11423348_14
Contributors :
ContributionNameEmailORCID, AE, CB, JW,
Related URLs :
Additional Information : Copyright Springer-Verlag Berlin Heidelberg 2005. The original publication is available at
Depositing User : Symplectic Elements
Date Deposited : 14 Mar 2012 14:31
Last Modified : 06 Jul 2019 05:08

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800