Security Investigate

Automatic Verification of Correspondences for Security Protocols

Download now Free registration required

Executive Summary

The authors present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Their technique is fully automatic, it can handle an unbounded number of sessions of the protocol, and it is efficient in practice. It significantly extends a previous technique for the verification of secrecy. The protocol is represented in an extension of the pi calculus with fairly arbitrary cryptographic primitives. This protocol representation includes the specification of the correspondence to be verified, but no other annotation. This representation is then translated into an abstract representation by Horn clauses, which is used to prove the desired correspondence.

  • Format: PDF
  • Size: 527.87 KB