Abstract

In this paper, we propose a practical model checking methodology for the analysis of key exchange confidentiality property and authentication property of cryptographic protocols modelled by Coloured Petri Net CPN; and propose a new attack trace generation algorithm based on the Observed Coloured Petri Net OCPN, which is equipped with indicators that allow observation of the tokens in some of the places and/or observation of the firing of some of the transitions. Our methodology offers an efficient analysis of all attack traces for each found attack. In addition, we apply our method to TMN authenticated key exchanged protocol of mobile communication systems, and verified the effectiveness of our methodology.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call