Verifying security protocols by knowledge analysis

Ma, Xiaoqi and Cheng, Xiaochun ORCID logoORCID: (2008) Verifying security protocols by knowledge analysis. International Journal of Security and Networks, 3 (3) . pp. 183-192. ISSN 1747-8405 [Article] (doi:10.1504/IJSN.2008.020092)


This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols. The method can detect attacks and flaws involving interleaving sessions besides normal attacks. The implementation of the method in a generic theorem proving environment, namely Isabelle, makes the verification of protocols mechanical and efficient; it can verify a medium-sized security protocol in less than ten seconds. As an example, the paper finds the flaw in the Needham-Schroeder public key authentication protocol and proves the secure properties and guarantees of the protocol with Lowe's fix to show the effectiveness of this method

Item Type: Article
Additional Information: Special Issue on Cryptography in Network
Research Areas: A. > School of Science and Technology > Computer Science
Item ID: 28074
Useful Links:
Depositing User: Xiaochun Cheng
Date Deposited: 05 Nov 2019 17:37
Last Modified: 09 Sep 2021 10:35

Actions (login required)

View Item View Item


Activity Overview
6 month trend
6 month trend

Additional statistics are available via IRStats2.