A Tool for Lazy Verification of Security ProtocolsReport as inadecuate




A Tool for Lazy Verification of Security Protocols - Download this document for free, or read online. Document in PDF available to download.

1 PROTHEO - Constraints, automatic deduction and software properties proofs INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications

Abstract : We present the lazy strategy implemented in a compiler of cryptographic protocols, Casrul. The purpose of this compiler is to verify protocols and to translate them into rewrite rules that can be used by several kinds of automatic or semi-automatic tools for finding flaws, or proving properties. It is entirely automatic, and the efficiency of the generated rules is guaranteed because of the use of a lazy model of an Intruder behavior. This efficiency is illustrated on several examples.

Mots-clés : automated deduction verification lazy model term rewriting protocoles cryptographiques réécriture déduction automatique modèle paresseux cryptographic protocols





Author: Yannick Chevalier - Laurent Vigneron -

Source: https://hal.archives-ouvertes.fr/



DOWNLOAD PDF




Related documents