Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
DOI: 10.1109/secpri.1997.601329
|View full text |Cite
|
Sign up to set email alerts
|

Automated analysis of cryptographic protocols using Murφ

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
215
0
3

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 262 publications
(224 citation statements)
references
References 12 publications
1
215
0
3
Order By: Relevance
“…Examples of this abound (e.g. [36,40,46,38]) and later in this work we use one such automated tool to perform a symbolic analysis which we have (by then) shown to be computationally sound in the UC model.…”
Section: The Symbolic Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Examples of this abound (e.g. [36,40,46,38]) and later in this work we use one such automated tool to perform a symbolic analysis which we have (by then) shown to be computationally sound in the UC model.…”
Section: The Symbolic Modelmentioning
confidence: 99%
“…Indeed, protocol analysis in these models is much simpler, more mechanical, and amenable to automation (see e.g. [36,39,53,46,11]). These are desirable properties when attempting to analyze large-scale systems.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the non-injective agreement property [21]: "For certain data items ds, if each time a principal B completes a run of the protocol as responder using ds, apparently with A, then there is a unique run of the protocol with the principal A as initiator using ds, apparently with B." The generated protocols could be re-analysed using more sophisticated protocol analysis tools, such as the NRL Analyzer [23], the Interrogator model [24], FDR [20], Murϕ [25], Athena [33]. In this case, the Protocol Selector of ASPB would be used to narrow down the set of candidate protocols to be verified.…”
Section: The Protocol Selectormentioning
confidence: 99%
“…The heuristics are also augmented by extending protocol selection/design strategies [16,21,22] in order to restrict the generated protocols to a collection of candidate protocols that are likely to be secure. While the collection of candidate protocols are secure under the BSW-ZF logic, the intention is that more sophisticated protocol analysis tools, such as [20,[23][24][25], are then used to select appropriate protocols from the collection.…”
Section: Introductionmentioning
confidence: 99%
“…The main systematic or formal approaches include specialised logics such as BAN logic [13,19,27], special-purpose tools designed for cryptographic protocol analysis [39], and theorem proving [55,56] and model-checking techniques using several general purpose tools [43,46,51,61,63]. Although these approaches differ in significant ways, all reflect the same basic assumptions about the way an adversary may interact with the protocol or attempt to decrypt encrypted messages.…”
Section: Introductionmentioning
confidence: 99%