Automation of Authentication and Key Distribution Schemes Design Based on Trace Formulae

Article Preview

Abstract:

The authentication and key distribution schemes are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This paper deals with the concept of design of such schemes (protocols) and their properties. The paper starts with the properties and requirements of designed protocol, followed by the description of the design concept based on the trace formula and the process of its automation within the design library. The presented library supports both the handling of protocol properties and protocol design.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

870-873

Citation:

Online since:

February 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] R. Corin, A. Durante, S. Etalle, P. Hartel, Using Trace Formulae for Security Protocol Design, Enschede, Rome, Amsterdam.

Google Scholar

[2] L. Michal, Methods of the Security Protocol Design, Brno University of Technology, Faculty of Information Technology, Brno, CZ (2010).

Google Scholar