TY - GEN
T1 - Alice and Bob meet equational theories
AU - Basin, David
AU - Keller, Michel
AU - Radomirović, Saša
AU - Sasse, Ralf
PY - 2015
Y1 - 2015
N2 - Cryptographic protocols are the backbone of secure communication over open networks and their correctness is therefore crucial. Tool-supported formal analysis of cryptographic protocol designs increases our confidence that these protocols achieve their intended security guarantees. We propose a method to automatically translate textbook style Alice&Bob protocol specifications into a format amenable to formal verification using existing tools. Our translation supports specification modulo equational theories, which enables the faithful representation of algebraic properties of a large class of cryptographic operators.
AB - Cryptographic protocols are the backbone of secure communication over open networks and their correctness is therefore crucial. Tool-supported formal analysis of cryptographic protocol designs increases our confidence that these protocols achieve their intended security guarantees. We propose a method to automatically translate textbook style Alice&Bob protocol specifications into a format amenable to formal verification using existing tools. Our translation supports specification modulo equational theories, which enables the faithful representation of algebraic properties of a large class of cryptographic operators.
UR - http://www.scopus.com/inward/record.url?scp=84960404863&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-23165-5_7
DO - 10.1007/978-3-319-23165-5_7
M3 - Conference contribution
AN - SCOPUS:84960404863
SN - 9783319231648
T3 - Lecture Notes in Computer Science
SP - 160
EP - 180
BT - Logic, Rewriting and Concurrency
A2 - Ölveczky, Peter Csaba
A2 - Talcott, Carolyn
A2 - Martí-Oliet, Narciso
PB - Springer
T2 - Conference on Logic, Rewriting and Concurrency dedicated to Jose Meseguer on the Occasion of his 65th Birthday
Y2 - 23 September 2015 through 25 September 2015
ER -