CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY

ICTACT Journal on Communication Technology ( Volume: 8 , Issue: 2 )

Abstract

vioft2nntf2t|tblJournal|Abstract_paper|0xf4ffcff323000000f2fb050001000b00
Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are being used to validate real life cryptographic protocols. These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security. In this paper, we discuss the brief history of formal methods and tools that are useful for the formal verification of the cryptographic protocols.

Authors

Amol H Shinde1, A J Umbarkar2, N R Pillai3
Walchand College of Engineering, India1,2, Defence Research & Development Organisation, New Delhi, India3

Keywords

Formal Verification, Security Protocols, Tools for Formal Analysis

Published By
ICTACT
Published In
ICTACT Journal on Communication Technology
( Volume: 8 , Issue: 2 )
Date of Publication
June 2017
Pages
1533-1539

ICT Academy is an initiative of the Government of India in collaboration with the state Governments and Industries. ICT Academy is a not-for-profit society, the first of its kind pioneer venture under the Public-Private-Partnership (PPP) model

Contact Us

ICT Academy
Module No E6 -03, 6th floor Block - E
IIT Madras Research Park
Kanagam Road, Taramani,
Chennai 600 113,
Tamil Nadu, India

For Journal Subscription: journalsales@ictacademy.in

For further Queries and Assistance, write to us at: ictacademy.journal@ictacademy.in