This chapter introduces formal methods, and how they are applied to cryptographic protocols to achieve high security assurance. It introduces formal methods, and how they can be applied to cryptographic protocols, in order to detect their weaknesses early and achieve high assurance about their correctness. The chapter starts with an introduction to cryptographic protocols and to formal methods. It presents the various ways formal methods can be used throughout the cryptographic protocols lifecycle. Cryptographic protocols aim to guarantee security proprieties in a distributed system against the antagonistic actions of attackers who threaten the system. Formal methods are rigorous, mathematically-based techniques used to analyze, design and implement computer-based systems. Formal methods are particularly important for protocols, for example as a way to enable protocol interoperability, i.e., the possibility for different implementations of the same protocol, developed by different software providers, to work together and to achieve the protocol goals.

Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols / Bringhenti, Daniele; Sisto, Riccardo; Valenza, Fulvio; Yusupov, Jalolliddin - In: Handbook of Formal Analysis and Verification in Cryptography / Akleylek S., Dundua B.. - ELETTRONICO. - [s.l] : CRC Press, 2023. - ISBN 978-0-367-54665-6. [10.1201/9781003090052-2]

Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols

Bringhenti, Daniele;Sisto, Riccardo;Valenza, Fulvio;Yusupov, Jalolliddin
2023

Abstract

This chapter introduces formal methods, and how they are applied to cryptographic protocols to achieve high security assurance. It introduces formal methods, and how they can be applied to cryptographic protocols, in order to detect their weaknesses early and achieve high assurance about their correctness. The chapter starts with an introduction to cryptographic protocols and to formal methods. It presents the various ways formal methods can be used throughout the cryptographic protocols lifecycle. Cryptographic protocols aim to guarantee security proprieties in a distributed system against the antagonistic actions of attackers who threaten the system. Formal methods are rigorous, mathematically-based techniques used to analyze, design and implement computer-based systems. Formal methods are particularly important for protocols, for example as a way to enable protocol interoperability, i.e., the possibility for different implementations of the same protocol, developed by different software providers, to work together and to achieve the protocol goals.
2023
978-0-367-54665-6
9781003090052
Handbook of Formal Analysis and Verification in Cryptography
File in questo prodotto:
File Dimensione Formato  
AcceptedChapter.pdf

Open Access dal 20/09/2024

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Pubblico - Tutti i diritti riservati
Dimensione 303.19 kB
Formato Adobe PDF
303.19 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2974321