Final Report of the COST-247 Action |
Using CSP for authentication protocol analysis: the Needham-Schroeder Public Key Protocol
Steve Schneider
Royal Holloway, University of London |
Egham, Surrey, TW20 0EX, UK |
E-Mail: steve@dcs.rhbnc.ac.uk |
tel: +44 1784 443431 |
fax: +44 1784 439786 |
This talk presents a general approach for analysis and verification of authentication properties in CSP. It is illustrated by an examination of the Needham-Schroeder Public-Key protocol. The paper aims to develop a specific theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such protocols in a natural and precise way with the ability to reason formally about the properties they exhibit.
This presentation has been given during the COST-247 9th Management Committee Meeting (Antalya, Turkey, November 4--5, 1996).
COST-247 Working Group(s):
This Page was prepared by Mark Jorgensen.