Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-1 of 1 total results
Breaking and Fixing the Needham-Schroeder Public-Key ...
In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP. We use FDR to discover an attack upon the protocol, which allows an intruder to impersonate another agent. We adapt the protocol, and then use FDR to show that the new protocol is secure, at least for a small system. Finally we prove a result which tells us that if this small ...