The Maude-NPA crypto tool is a specialized model checker for cryptographic security protocols that take into account the algebraic properties of the cryptosystem. In the literature, additional crypto properties have uncovered weaknesses of security protocols and, in other cases, they are part of the protocol security assumptions in order to function properly. Maude-NPA has a theoretical basis on rewriting logic, equational unification, and narrowing to perform a backwards search from an insecure state pattern to determine whether or not it is reachable. Maude-NPA can be used to reason about a wide range of cryptographic properties, including cancellation of encryption and decryption, Diffie-Hellman exponentiation, exclusive-or, and some approximations of homomorphic encryption.In this thesis, we consider new cryptographic properties, either as part of security protocols or to discover new attacks. We have also modeled different families of security protocols, including Distance Bounding Protocols or Multiparty key agreement protocols. And we have developed new protocol modeling techniques to reduce the time and space analysis effort. This thesis contributes in several ways to the area of cryptographic protocol analysis and many of the contributions of this thesis can be useful for other crypto analysis tools.The Diffie-Hellman key exchange protocol of Section 1.1.3 is the earliest practical example of a public key agreement protocol implemented within the field of cryptography. The Diffie-Hellman key exchange algorithm allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. The protocol is described in Alice & Bob notation as follows where we remark the shared key between participants:A multi-party key establishment can be seen as a generalization of a twoparty key establishment. They are different versions of Diffie-Hellman key agreement that can negotiate a key shared by two or more participants. In the case of three honest participants in an insecure channel, a malicious participant can only see g a , g b , g c ,These honest participants have different options for choosing the order in which they contribute to the key. In the case of four honest participants, the protocol is as follows:In Chapter 3, we specify several three-party key agreement protocols where each protocol creates a shared secret key different from the three-party Diffie-Hellman. The STR protocol uses nested exponentiations. The Joux protocolThis protocol assumes the equational theory DH-CFVP above and its constructor sub-theory DH-SubCFVP. The expression X a computed by Alice is transformed into g a•N using X → g N . The transformed version of the protocol is as follows:where variables X and Y before were of sort Exp and here variables Ny and Nx are of sort ElemSet. In Chapter 3, the cryptography theories of all the analyzed protocols include constructor symbols, all the protocols have been transformed and the variant equations are no longer necessary.