par Delzanno, Giorgio ;Ganty, Pierre
Référence Lecture notes in computer science, 2988, page (342-356)
Publication Publié, 2004
Article révisé par les pairs
Résumé : We investigate the applicability of symbolic exploration to the automatic verification of secrecy and authentication properties for time sensitive cryptographic protocols. Our formal specifications are given in multiset rewriting over first order atomic formulas enriched with constraints so as to uniformly model fresh name generation and validity condition of time stamps. Our verification approach is based on data structures for symbolically representing sets of configurations of an arbitrary number of parallel protocol sessions. As a case study we discuss the verification of timed authentication for the Wide Mouth Frog protocol. © Springer-Verlag 2004.