Conference
Modeling and Veri cation of cryptographic protocols using coloured petri nets and design/CPN
Abstract
In this paper, we present a technique to model and analyse cryptographic protocols using coloured Petri nets. A model of the protocol is constructed in a top-down manner: rst the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to reduce the size of the occurrence graph. A smaller occurrence graph facilitates deducing whether …
Authors
Al-Azzoni I; Down DG; Khedri R
Pagination
pp. 1-19
Publication Date
December 1, 2005
Conference proceedings
Proceedings of Mompes 2005 2nd International Workshop on Model Based Methodologies for Pervasive and Embedded Software