Chapter 24: Introduction to secure process algebra

Abstract

This chapter introduces the background of secure process algebra.

Keywords

Security; Process Algebra; True Concurrency

A security protocol [29] includes some computational operations, some cryptographic operations (for examples, symmetric encryption/decryption, asymmetric encryption/decryption, hash function, digital signatures, message authentication codes, random sequence generations, XOR operations, etc.), some communication operations to exchange data, and also the computational logics among these operations.

Designing a perfectly practical security protocol is quite a complex task, because of the open network environments and the complex security requirements against various known and ...

Get Handbook of Truly Concurrent Process Algebra now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.