This chapter introduces formal methods, and how they are applied to cryptographic protocols to achieve high security assurance. It introduces formal methods, and how they can be applied to cryptographic protocols, in order to detect their weaknesses early and achieve high assurance about their correctness. The chapter starts with an introduction to cryptographic protocols and to formal methods. It presents the various ways formal methods can be used throughout the cryptographic protocols lifecycle. Cryptographic protocols aim to guarantee security proprieties in a distributed system against the antagonistic actions of attackers who threaten the system. Formal methods are rigorous, mathematically-based techniques used to analyze, design and implement computer-based systems. Formal methods are particularly important for protocols, for example as a way to enable protocol interoperability, i.e., the possibility for different implementations of the same protocol, developed by different software providers, to work together and to achieve the protocol goals.
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols / Bringhenti, Daniele; Sisto, Riccardo; Valenza, Fulvio; Yusupov, Jalolliddin - In: Handbook of Formal Analysis and Verification in Cryptography / Akleylek S., Dundua B.. - ELETTRONICO. - [s.l] : CRC Press, 2023. - ISBN 978-0-367-54665-6. [10.1201/9781003090052-2]
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols
Bringhenti, Daniele;Sisto, Riccardo;Valenza, Fulvio;Yusupov, Jalolliddin
2023
Abstract
This chapter introduces formal methods, and how they are applied to cryptographic protocols to achieve high security assurance. It introduces formal methods, and how they can be applied to cryptographic protocols, in order to detect their weaknesses early and achieve high assurance about their correctness. The chapter starts with an introduction to cryptographic protocols and to formal methods. It presents the various ways formal methods can be used throughout the cryptographic protocols lifecycle. Cryptographic protocols aim to guarantee security proprieties in a distributed system against the antagonistic actions of attackers who threaten the system. Formal methods are rigorous, mathematically-based techniques used to analyze, design and implement computer-based systems. Formal methods are particularly important for protocols, for example as a way to enable protocol interoperability, i.e., the possibility for different implementations of the same protocol, developed by different software providers, to work together and to achieve the protocol goals.File | Dimensione | Formato | |
---|---|---|---|
AcceptedChapter.pdf
Open Access dal 20/09/2024
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
PUBBLICO - Tutti i diritti riservati
Dimensione
303.19 kB
Formato
Adobe PDF
|
303.19 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2974321