Access Restriction

Author Mei Lin Hui ♦ Lowe, G.
Source IEEE Xplore Digital Library
Content type Text
Publisher Institute of Electrical and Electronics Engineers, Inc. (IEEE)
File Format PDF
Copyright Year ©1999
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Public key ♦ Cryptography ♦ Cryptographic protocols ♦ Computer security ♦ State-space methods ♦ Mathematics ♦ Computer science ♦ Electronic mail ♦ Tellurium ♦ Electrical capacitance tomography
Abstract Recent techniques for analyzing security protocols have tended to concentrate upon the small protocols that are typically found in the academic literature. However there is a huge gulf between these and most large commercial protocols: the latter typically have many more fields, and much higher levels of nested encryption. As a result, existing techniques are difficult to apply directly to these large protocols. In this paper we develop the notion of safe simplifying transformations: transformations that have the property of preserving insecurities; the effect of such transformations is that if we can verify the transformed protocol, then we will have verified the original protocol. We identify a number of such safe simplifying transformations, and use them in the analysis of a commercial protocol.
Description Author affiliation: Dept. of Math. & Comput. Sci., Leicester Univ., UK (Mei Lin Hui)
ISBN 0769502016
ISSN 10636900
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research ♦ Reading
Education Level UG and PG
Learning Resource Type Article
Publisher Date 1999-06-30
Publisher Place Italy
Rights Holder Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Size (in Bytes) 160.15 kB
Page Count 12
Starting Page 32
Ending Page 43

Source: IEEE Xplore Digital Library