The tools for cryptographic protocols analysis based on state exploration are designed to be completely automatic and should carry out their job with a reasonable amount of computing and storage resources, even when run by users having a limited amount of expertise in the field. This paper compares four tools of this kind to highlight their features and ability to detect bugs under the same experimental conditions. To this purpose, the ability of each tool to detect known flaws in a uniform set of well-known cryptographic protocols has been checked. Results are also given on the relative performance of the tools when analysing several known-good protocols with an increasing number of parallel sessions.

Tools for cryptographic protocols analysis: A technical and experimental comparison / Cheminod, M.; BERTOLOTTI CIBRARIO, I.; Durante, L; Sisto, R; Valenzano, A.. - In: COMPUTER STANDARDS & INTERFACES. - ISSN 0920-5489. - 31:5(2009), pp. 954-961. [10.1016/J.CSI.2008.09.030]

Tools for cryptographic protocols analysis: A technical and experimental comparison

CHEMINOD M.;BERTOLOTTI CIBRARIO I.;DURANTE L;SISTO R;VALENZANO A.
2009

Abstract

The tools for cryptographic protocols analysis based on state exploration are designed to be completely automatic and should carry out their job with a reasonable amount of computing and storage resources, even when run by users having a limited amount of expertise in the field. This paper compares four tools of this kind to highlight their features and ability to detect bugs under the same experimental conditions. To this purpose, the ability of each tool to detect known flaws in a uniform set of well-known cryptographic protocols has been checked. Results are also given on the relative performance of the tools when analysing several known-good protocols with an increasing number of parallel sessions.
File in questo prodotto:
File Dimensione Formato  
01_11583_1856812.pdf

accesso aperto

Descrizione: accepted manuscript
Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Creative commons
Dimensione 366.16 kB
Formato Adobe PDF
366.16 kB Adobe PDF Visualizza/Apri
1-s2.0-S0920548908001451-main.pdf

accesso riservato

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 764.05 kB
Formato Adobe PDF
764.05 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/1856812