Chapter 2. Modelling security protocols in CSP

Security protocols work through the interaction of a number of processes in parallel that send each other messages. CSP is therefore an obvious notation for describing both the participants in the network and the composition that puts them together. In this chapter we describe how this is done, concentrating specifically on how protocol models can be built that allow us to probe for security flaws.

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.