Abstract
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task. In this work, we develop a formal method based on dynamic epistemic logic to analyze and describe cryptographic protocols. In particular, we adopt the action model to depict the execution process of the protocol. To verify the security, the intruder’s actions are analyzed. We model exactly the protocol applying our formal language and give the verification models according to the security requirements of this cryptographic protocol. With analysis and proof on a selected example, we show the usefulness of our method. The result indicates that the selected protocol meets the security requirements.
Highlights
The security of cryptographic protocols is crucial in the design of the protocols as cryptographic protocols need to consider attacks from attackers
The security verification of cryptographic protocols is important for checking whether the protocol meets security goals
Sci. 2020, 10, 6577 dynamic epistemic logic language to describe the protocol with classical cryptography and give the action model according to the action characteristics
Summary
The security of cryptographic protocols is crucial in the design of the protocols as cryptographic protocols need to consider attacks from attackers. There are many works of literature (e.g., [1,2,3,4,5]) on the application of logical methods to analyze and verify cryptographic protocols. Most of the protocols analyzed by epistemic logic are authentication protocols in the existing literature They use the method of model checking to analyze. Security verification of quantum cryptography protocol may be more challenging Sci. 2020, 10, 6577 dynamic epistemic logic language to describe the protocol with classical cryptography and give the action model according to the action characteristics. A formal language is developed to describe the cryptographic protocol. The second section displays related work about verification and analysis of the cryptographic protocol.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have