Home
Scholarly Works
Modeling and Veri cation of cryptographic...
Conference

Modeling and Veri cation of cryptographic protocols using coloured petri nets and design/CPN

Abstract

In this paper, we present a technique to model and analyse cryptographic protocols using coloured Petri nets. A model of the protocol is constructed in a top-down manner: rst the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to reduce the size of the occurrence graph. A smaller occurrence graph facilitates deducing whether particular security goals are met.

Authors

Al-Azzoni I; Down DG; Khedri R

Pagination

pp. 1-19

Publication Date

December 1, 2005

Conference proceedings

Proceedings of Mompes 2005 2nd International Workshop on Model Based Methodologies for Pervasive and Embedded Software

Contact the Experts team