CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ffcff323000000f2fb050001000b00
Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are being used to validate real life cryptographic protocols. These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security. In this paper, we discuss the brief history of formal methods and tools that are useful for the formal verification of the cryptographic protocols.

Authors
Amol H Shinde1, A J Umbarkar2, N R Pillai3
Walchand College of Engineering, India1,2, Defence Research & Development Organisation, New Delhi, India3

Keywords
Formal Verification, Security Protocols, Tools for Formal Analysis
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000000000000
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 8 , Issue: 2 , Pages: 1533-1539 )
Date of Publication :
June 2017
Page Views :
133
Full Text Views :
2

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.