Browse > Article
http://dx.doi.org/10.13089/JKIISC.2003.13.5.17

Automation-considered SVO Logic for Verifying Authentication and Key Distribution Protocols  

권태경 (세종대학교 컴퓨터공학부)
임선간 (한국정보보호진흥원)
박해룡 (한국정보보호진흥원)
Abstract
This paper presents the ASVO (Automation-considered SVO) Logic that can be used for verifying authentication and key distribution protocols. The ASVO logic was designed for automatic verification, in a way to modify the SVO logic, one of the most famous authentication logics. The ASVO logic is syntactically and semantically sound, and requires relatively simple verification steps. Also we implemented the Isabelle/ASVO system which supports semi-automated verification, by using the Isabelle/Isar system.
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 On unifying some cryptographic protocol logics /
[ P.Syverson;P. van OorschotSyt ] / Proc. of the IEEE Symposium on Research in Security and Privacy
2 A semantics for a logic of authentication /
[ M Aadi;M.Tuttle ] / Proc. of the Tenth Annual ACM Symposium on Principles of distributed Computing
3 Reasoning about belief in cryptographic protocols /
[ L.Gong;R.Needham;R.Yahalom ] / Proc. of the IEEE Symposium on Research in Security and Privacy
4 Automation considered Logic of Authentication and key distribution /
[ Taekyoung Kwon;Seongan Lim ] / WISA, Lecture Notes in Computer Science
5 A unified cryptographic protocol logic /
[ P.Syverson;P. van Oorschot ] / NRL Publication 5540~227, Naval Research Lab
6 A logic of authentication /
[ M.Burrows;M.Abadi;R.Needham ] / Technical Report SRC PR 39
7 Timestamps in key distribution protocols /
[ D.Denning;G.Sacco ] / Communications of the ACM   DOI
8 The logic of authentication protocols /
[ P.Syverson;Iliano Cervesato ] / Leture Notes in computer Science
9 Isabelle/HOL /
[ T.Nipkow;L.Paulson;M.Wenzel ] / Lecture Notes in Computer Science
10 /
[ R.Goldblatt ] / Mathematical Modal Logic: a view of its Evolution
11 Extending cryptographic logics of belief to key agreement protocols /
[ P. van Oorschot ] / Proc. of the ACM Conference on Computer Communications Security
12 Some new attacks upon security protocols /
[ G.Lowe ] / IEEE Computer Security Foundations Workshop
13 C3PO: a tool for automatic sound cryptographic protocol analysis /
[ A.Dekker ] / Proc. of the IEEE Coumputer Security Foundation Workshop
14 Breaking and fixing the Needham-Schroeder public-ey protocol using FDR /
[ G.Lowe ] / Software-Concepts and Tools
15 Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification /
[ S.Grizalis;D.Spinellis;P.Georgiadis ] / Computer Communications
16 암호프로토콜 논리성 자동 검증에 관한 연구 /
[ 권태경;양숙현;김승주;임선간 ] / 한국정보보호학회 논문지   과학기술학회마을
17 Using encryption for authentication in large networks of computers /
[ R.Needhan;M.Schroeder ] / Communications of the ACM   DOI   ScienceOn