The tools for cryptographicprotocols analysis based on state exploration are designed to be completely automatic and should carry out their job with a reasonable amount of computing and storage resources, even when run by users having a limited amount of expertise in the field. This paper compares four tools of this kind to highlight their features and ability to detect bugs under the same experimental conditions. To this purpose, the ability of each tool to detect known flaws in a uniform set of well-known cryptographicprotocols has been checked. Results are also given on the relative performance of the tools when analysing several known-good protocols with an increasing number of parallel sessions.

Tools for Cryptographic Protocols Analysis: A Technical and Experimental Comparison

M Cheminod;I Cibrario Bertolotti;L Durante;R Sisto;A Valenzano
2009

Abstract

The tools for cryptographicprotocols analysis based on state exploration are designed to be completely automatic and should carry out their job with a reasonable amount of computing and storage resources, even when run by users having a limited amount of expertise in the field. This paper compares four tools of this kind to highlight their features and ability to detect bugs under the same experimental conditions. To this purpose, the ability of each tool to detect known flaws in a uniform set of well-known cryptographicprotocols has been checked. Results are also given on the relative performance of the tools when analysing several known-good protocols with an increasing number of parallel sessions.
2009
Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT
Inglese
31
5
954
961
8
http://www.sciencedirect.com/science/article/pii/S0920548908001451
Sì, ma tipo non specificato
Protocol verification
Formal methods
Network-level security and protection
5
info:eu-repo/semantics/article
262
M. Cheminod; I. Cibrario Bertolotti; L. Durante; R. Sisto; A. Valenzano
01 Contributo su Rivista::01.01 Articolo in rivista
none
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/50119
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 13
  • ???jsp.display-item.citation.isi??? ND
social impact