Abstract
This paper describes one of possible implementations of method used for protocol design described in a paper from 1998 by L. Buttyán, S. Staamann and U. Wilhelm which proposes a backward search (regression) when synthesizing an authentication protocol. Furthermore, the approach presented in this paper allows a designer to define participants who are trustworthy enough to transfer information between other two participants without existence of a direct channel to achieve basic routing functionality.
Chapter PDF
Similar content being viewed by others
References
Cremers, C.J.F.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)
Needham, R., Schroeder, M.: Using Encryption for Authentication in Large Networks of Computers. CACM 21/12 (December 1978)
Lowe, G.: An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters (56), 131–133 (1995)
Mikus, P.: Tools for Environment for the Simulation of Communication, Master’s thesis, FIT Brno University of Technology, Brno, Supervisor: Pavel Ocenasek (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pavel, O. (2011). Analysis of Authentication Protocols with Scyter: Case Study. In: Smith, M.J., Salvendy, G. (eds) Human Interface and the Management of Information. Interacting with Information. Human Interface 2011. Lecture Notes in Computer Science, vol 6771. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21793-7_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-21793-7_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21792-0
Online ISBN: 978-3-642-21793-7
eBook Packages: Computer ScienceComputer Science (R0)