Abstract: The present column is dedicated to cryptographic protocol analysis , a research field in which the synergy between logics and security has proven particularly fruitful, leading to the development of automated cryptographic protocol verifiers, which are by now mature enough to handle today's protocol standards, such as TLS. This is a remarkable result, given the complexity of protocol analysis: security properties, which encompass trace properties as well as observational equivalence relations, are undecidable and, in particular, have to be proven against a universally quantified attacker, which can schedule the communication among honest parties, possibly interleaving different protocol sessions, and arbitrarily intercept, modify and create cryptographic messages.
Publication Year: 2017
Publication Date: 2017-11-03
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot