Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool

Provided by: Journal of Communications
Topic: Security
Format: PDF
Formal verification aims at providing a rigid and thorough means of evaluating the correctness of security protocols and also establishing that the protocols are free of weaknesses that can be exploited by attacks. This paper discusses the process of formal verification using a logic-based verification tool. The verification tool with attack detection capabilities is introduced, and the verification process is demonstrated by way of a case study on two published security protocols that provide mutual authentication using smart cards.

Find By Topic