2017
DOI: 10.21917/ijct.2017.0226
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Protocols Specification and Verification Tools - A Survey

Abstract: Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are being used to validate real life cryptographic protocols. These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security. In this paper, we discuss the brief history of formal methods and tools that are u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 53 publications
0
1
0
Order By: Relevance
“…TLS, Kerberos) protocols are usually verified in less than a second. Moreover, Scyther is currently the fastest protocol verification tool that does not use approximation methods [49].…”
Section: Randomness Evaluationmentioning
confidence: 99%
“…TLS, Kerberos) protocols are usually verified in less than a second. Moreover, Scyther is currently the fastest protocol verification tool that does not use approximation methods [49].…”
Section: Randomness Evaluationmentioning
confidence: 99%