Abstract
This paper integrates logic and process calculus components to permit the comprehensive simulation and analysis of cryptographic protocols. The approach permits proofs about the information transmitted in protocols as well as the behavior of participating principals.
Chapter PDF
References
Abadi, M. and Cardelli, L. (1995) An imperative object calculus, Proceedings of the Conference on Theory and Practice of Software, 471–485.
Abadi, M. and Gordon D. (1997) Reasoning about cryptographic protocols in the Spi calculus. Proceedings of the Fourth ACM Conference on Computer and Communications Security, 36–47.
Burrows, M., Abadi, M. and Needham, R. (1990) A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.
Galiasso, P. (1998) Mechanization of ROC in Higher Order Logic. M.S. Thesis, Computer Science Department, University of Tulsa, Tulsa, Oklahoma.
Gong, L., Needham, R. and Yahalom, R. (1990) Reasoning about belief in cryptographic protocols. Proceedings of the IEEE Symposium on Research in Security and Privacy, 234–248.
Gordon, M. and Melham, T. (1993) Introduction to Higher Order Logic (HOL). Cambridge University Press, Cambridge, U.K.
Hale, J., Threet, J. and Shenoi, S. (1997) A framework for high assurance security of distributed objects, in Database Security, X: Status and Prospects (eds. P. Samarati and R. Sandhu), Chapman and Hall, London, 101–119.
Lowe G. (1995) An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 56(3), 131–133.
Lowe G. (1996) Some new attacks upon security protocols. Proceedings of the Ninth IEEE Computer Security Foundations Workshop.
Melham, T. (1992) A mechanized theory of the π-calculus in HOL. Technical Report 244, University of Cambridge Computer Laboratory, Cambridge, U.K.
Milner, R. (1989) Communication and Concurrency. Prentice-Hall, New York.
Milner, R., Farrow, J. and Walker, D. (1989) A calculus of mobile processes. Report ECS-LFCS-89-85&86, University of Edinburgh, Edinburgh, U.K.
Pfleeger, C. (1997) Security in Computing. Prentice Hall, Upper Saddle River, New Jersey.
Schneier, B. (1996) Applied Cryptography. John Wiley, New York.
Syverson, P. and van Oorschot, P. (1994) On unifying some cryptographic protocol logics, Proceedings of the IEEE Symposium on Research in Security and Privacy, 165–177
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Kluwer Academic Publishers
About this chapter
Cite this chapter
Papa, M., Bremer, O., Magill, S., Hale, J., Shenoi, S. (2002). Simulation And Analysis of Cryptographic Protocols. In: Thuraisingham, B., van de Riet, R., Dittrich, K.R., Tari, Z. (eds) Data and Application Security. IFIP International Federation for Information Processing, vol 73. Springer, Boston, MA. https://doi.org/10.1007/0-306-47008-X_8
Download citation
DOI: https://doi.org/10.1007/0-306-47008-X_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7514-2
Online ISBN: 978-0-306-47008-0
eBook Packages: Springer Book Archive