On modelling security protocols for logic-based verification

Reiner Dojen, Jinyong Chen, Tom Coffey

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Formal verification is an imperative step in the design cycle of security protocols. One of the most critical steps in formal verification is the formalisation of the security protocol in the language of the verification technique, as any mistakes in the formalisation can invalidate the outcome of the verification. However, security protocols are constantly evolving. Hence, verification techniques need to be adjusted to facilitate appropriate formalisations of newly arising features or operations of security protocols. This paper concerns modelling security protocols for formal verification. Different ways to model lightweight operations in a logic-based verification tool are discussed. An extension of the verification tool, that facilitates direct modelling of lightweight operations in security protocols, is then described. Finally, a remote authentication scheme is formalised and verified using the extended tool.

Original languageEnglish
Title of host publicationIET Conference Publications
PublisherInstitution of Engineering and Technology
Pages79-84
Number of pages6
EditionCP639
ISBN (Print)9781849199247
DOIs
Publication statusPublished - 2014
Event25th IET Irish Signals and Systems Conference, ISSC 2014 and China-Ireland International Conference on Information and Communications Technologies, CIICT 2014 - Limerick, Ireland
Duration: 26 Jun 201427 Jun 2014

Publication series

NameIET Conference Publications
NumberCP639
Volume2014

Conference

Conference25th IET Irish Signals and Systems Conference, ISSC 2014 and China-Ireland International Conference on Information and Communications Technologies, CIICT 2014
Country/TerritoryIreland
CityLimerick
Period26/06/1427/06/14

Keywords

  • Exclusive-or operation
  • Formal verification
  • Logic based verification tool
  • Remote user authentication protocol

Fingerprint

Dive into the research topics of 'On modelling security protocols for logic-based verification'. Together they form a unique fingerprint.

Cite this