vioft2nntf2t|tblJournal|Abstract_paper|0xf4ffcff323000000f2fb050001000b00 Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are being used to validate real life cryptographic protocols. These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security. In this paper, we discuss the brief history of formal methods and tools that are useful for the formal verification of the cryptographic protocols.
Amol H Shinde1, A J Umbarkar2, N R Pillai3 Walchand College of Engineering, India1,2, Defence Research & Development Organisation, New Delhi, India3
Formal Verification, Security Protocols, Tools for Formal Analysis
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 8 , Issue: 2 , Pages: 1533-1539 )
Date of Publication :
June 2017
Page Views :
231
Full Text Views :
3
|