Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Computer Aided Verification
  3. Conference paper

Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols

  • Invited Papers
  • Conference paper
  • First Online: 01 January 2005
  • pp 77–87
  • Cite this conference paper
Computer Aided Verification (CAV 1998)
Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols
  • Dominique Bolignano1 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1427))

Included in the following conference series:

  • International Conference on Computer Aided Verification
  • 421 Accesses

  • 6 Citations

Abstract

We discuss the advantages and limitations of the main proof-based approaches to the formal verification of cryptographic protocols. We show possible routes for addressing their limitations by combining them with model-checking techniques. More precisely we argue that proof-based techniques can be used for providing a general framework, model-checking techniques for mechanization and invariant techniques for bringing precise understanding of protocol strengths and weaknesses.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Studying Formal Security Proofs for Cryptographic Protocols

Chapter © 2017

Automated Cryptographic Analysis of the Pedersen Commitment Scheme

Chapter © 2017

A Fast Method for Security Protocols Verification

Chapter © 2019

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Cryptology
  • Formal Languages and Automata Theory
  • Formal Logic
  • Models of Computation
  • Proof Theory and Constructive Mathematics
  • Principles and Models of Security

References

  1. J.R. Abrial. The B-method for large software specification, design and coding. In VDM'91. Springer Verlag, 1991.

    Google Scholar 

  2. P. Bieber and N. Boulahia-Cuppens. Formal development of authentication protocols. In BCS-FAGS sixth Refinement Workshop, 1994.

    Google Scholar 

  3. D. Bolignano. Formal verification of cryptographic protocols. In Proceedings of the third ACM Conference on Computer and Communication Security, 1996.

    Google Scholar 

  4. D. Bolignano. Towards the Formal Verification of Electronic Commerce Protocols. In Proceedings of the 10 th IEEE Computer Security Foundations Workshop. IEEE, June 1997.

    Google Scholar 

  5. D. Bolignano. Towards the Mechanization of Cryptographic Protocol Verification. In Proceedings of the 9th International Conference on Computer-Aided Verification (CAV'97), June 1997.

    Google Scholar 

  6. D. Bolignano. Using abstractions for automatizing and simplifying the verification of cryptographic protocols. Technical report, Dyade, 1998.

    Google Scholar 

  7. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8, 1990.

    Google Scholar 

  8. P. Syverson C. Meadows. A formal specification of requirements for payment transactions in the set protocol. In Finacial Cryptography, 1998.

    Google Scholar 

  9. P.C. Chen and V.D. Gligor. On the formal specification and verification of a multiparty session protocol. In Proceedings of the IEEE Symposium on Research in Security and Privacy, 1990.

    Google Scholar 

  10. D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198–208, 1983.

    Article  Google Scholar 

  11. G.Leduc, O. Bonaventure, E. Koerner, L. Leonard, C. Pecheur, and D. Zanetti. Specification and verification of a ttp protocol for the conditional access to services. In Proceedings of the 12th Workshop on the Application of Formal Methods to System Development (Univ Montreal, 1996.

    Google Scholar 

  12. R.A. Kemmerer. Analyzing encryption protocols using formal verification techniques. In IEEE Journal on Selected Areas in Communications, volume 7(4), 1989.

    Google Scholar 

  13. G. Lowe. An attack on the needham-schroeder public-key protocol. In Information Processing Letters, 1995.

    Google Scholar 

  14. C. Meadows. Applying formal methods to the analysis of a key management protocol. In Journal of Computer Security, 1992.

    Google Scholar 

  15. J. K. Millen, S.C. Clark, and S.B. Freedman. The interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, 13(2), 1987.

    Google Scholar 

  16. L. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 1998.

    Google Scholar 

  17. E. Snekkenes. Roles in cryptographic protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 105–119. IEEE, 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Dyade, B.P.105, 78153, Le Chesnay Cedex, France

    Dominique Bolignano

Authors
  1. Dominique Bolignano
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Alan J. Hu Moshe Y. Vardi

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bolignano, D. (1998). Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols. In: Hu, A.J., Vardi, M.Y. (eds) Computer Aided Verification. CAV 1998. Lecture Notes in Computer Science, vol 1427. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028735

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/BFb0028735

  • Published: 18 June 2005

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64608-2

  • Online ISBN: 978-3-540-69339-0

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Modal Logic
  • Security Property
  • Visible Action
  • Formal Verification
  • Cryptographic Protocol

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature