Security

Analysis of Some Famous Cryptographic Protocols Using the Interpretation-Function-Based Method

Download Now Free registration required

Executive Summary

This paper shows the efficiency and the flexibility of the interpretation function-based method through the analysis of some famous cryptographic protocols. In fact, by using the notion of interpretation function, this method gives general and sufficient conditions allowing to guarantee the secrecy property of cryptographic protocols. This result holds under a large class of equational theories that makes the approach flexible and general. Moreover, the approach does not only help to prove the secrecy property, but also helps a lot to discover protocols weaknesses and to correct them. These advantages are discussed and illustrated by cases study of some protocols that are analyzed in different equational theories.

  • Format: PDF
  • Size: 190.46 KB