Chapter 28: Analyses of practical protocols
Abstract
This chapter introduces the modeling of practical protocols based on truly concurrent process algebra.
Keywords
Practical Protocols; Process Algebra; True Concurrency
In this chapter, we will introduce analyses of some practical authentication and key exchange protocols. For a perfectly practical security protocol, it should resist any kind of attack. There are many kinds of attacks, it is difficult to model all known attacks, for simplicity, we only analyze the protocols with several kinds of main attacks.
We introduce analyses of Wide-Mouth Frog protocol in Section 28.1, Yahalom protocol in Section 28.2, Needham–Schroeder protocol in Section 28.3, Otway–Rees protocol in Section 28.4, Kerberos protocol ...
Get Handbook of Truly Concurrent Process Algebra now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.