Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

Efficient Representation of the Attacker's Knowledge in Cryptographic Protocols Analysis

Academic Article
Publication Date:
2008
abstract:
This paper addresses the problem of representing the intruder's knowledge in the formal verification of cryptographic protocols, whose main challenges are to represent the intruder's knowledge efficiently and without artificial limitations on the structure and size of messages. The new knowledge representation strategy proposed in this paper achieves both goals and leads to practical implementation because it is incrementally computable and is easily amenable to work with various term representation languages. In addition, it handles associative and commutative term composition operators, thus going beyond the free term algebra framework. An extensive computational complexity analysis of the proposed representation strategy is included in the paper.
Iris type:
01.01 Articolo in rivista
Keywords:
Cryptographic protocols; Knowledge representation; State space exploration
List of contributors:
Durante, Luca; Valenzano, Adriano; CIBRARIO BERTOLOTTI, Ivan; Sisto, Riccardo
Authors of the University:
CIBRARIO BERTOLOTTI IVAN
DURANTE LUCA
Handle:
https://iris.cnr.it/handle/20.500.14243/50114
Published in:
FORMAL ASPECTS OF COMPUTING
Journal
  • Overview

Overview

URL

http://www.springerlink.com/content/4l1mmn0l306020nj/
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)