Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings
International Conference on Software Technology and Engineering (ICSTE 2012)
Jianhong Zhou
Jianhong Zhou
Search for other works by this author on:
No. of Pages:
ASME Press
Publication date:

We present in this paper a practical application of the Spin model checker for verifying cryptographic protocols was shown. Using the model so built, Spin can find a known attack on the protocol and it correctly validates the fixed version of the protocol. The experimental results for this cryptographic Public-key protocol convince us the method is useful. Our technique supports a protocol designer to provide formal analysis of the security properties. We illustrate the utility of our technique by exposing an attack on the well-studied two nodes protocol.

1. Introduction
2. Cryptographic Protocol
3. Specification Language
4. Model Checking the Protocol
5. Conclusion
This content is only available via PDF.
You do not currently have access to this chapter.
Close Modal

or Create an Account

Close Modal
Close Modal