Proving security protocols

Ariel Waissbein wata at corest.com
Thu Nov 1 14:01:07 EST 2001


there are several soures to investigate. a nice survey 
"varieties of secure distributed computing" by matt franklin
and moti yung introduces lots of protocos with proofs of
security for most. the survey is available on the net, and 
includes a huge bibliography list form where you can carry on.

Other names i'd mention are andrew yao, martin abadi, joan
feigenbaum, don beaver, phil rogaway , silvio micali, isai 
kushilevitz, shafi goldwasser, claude crepeau, michel luby, 
and oded goldreich. ah, i'm forgeting joe kilian. their work 
shares light in the direction you seek, but i have seen no 
comprehensive work on the literature. 

best,
Ariel

Roop Mukherjee wrote:
> 
> I have being trying to read about formally proving security protocols. I
> have seen the work of Needham, Paulson et. al., Meadows among others.
> 
> I was wondering if anyone here has seen a comparison between these
> approaches to evaluate things like ease of use and effectiveness. I mean
> something with a little more detail than the related work section of most
> of these papers.
> Is one of these approaches considered as "best-practice" or is more
> commonly used than the other?
> Can someone offer some criticism of the practice formal verification in
> general ?
> 
> Thanks,
> -- Roop
> ________________________________________
> 
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com

-- 
====================[ CORE Security Technologies ]==================
Ariel Waissbein
Researcher - Corelabs

Pgp Fingerprint: 8D5E 46CC A6DA C46F 1EBC  C3D3 210A 37F0 8A47 76AA

email :  ariel_waissbein at corest.com
http://www.corest.com
===================================================================

I was scared. Petrified. Because (x) hearing voices isn't like 
catching a cold, you can't get rid of it with lemmon tea (y) 
it's inside, it is not some naevus, an epidermal blemish you 
can cover up or cauterise (z) I had no control over it. It was 
there of its own volition, just stopped in and (zz) I was going
bananas.
-Tibor Fischer ``The Thought Gang"



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list