Loading...
Search for:
seifollahpour--najmeh
0.028 seconds
Description and Analysis of Security Protocol by Universal Composability Framework
, M.Sc. Thesis Sharif University of Technology ; Ramezanian, Rasoul (Supervisor)
Abstract
Security protocols may be provable secure when used alone, but these protocols lose their security under composition operation. Universal Composition framework (UC) is a tool for analyzing security protocols under composition. UC framework guarantees that the cryptographic protocols keep their security under this composition operation. In this paper we state a modeling for key-evolving signature protocol within the UC framework as a case study. To do this, the ideal functionality is proposed for key-evolving signature scheme that keeps the security requirements of this scheme. Finally, we show that UC definition of security is equivalent to definition of security which is termed here as...
Formal Analysis of Security Protocols using Theorem Proving
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Security protocols are mostly verified using tools based on model checking approach. These tools are automatic but they can be used for verifying protocols with low complexity and limited number of participants. The other approach that can be used in these cases is theorem proving. Inductive method is a theorem proving approach which is based on induction in mathematics. Inductive method has been applied for verifying several classical and real-world protocols.
The basic concepts in this method are event and trace. Using the concept of event, the network traffic can be modeled through various events occurring in the network. Atrace is a list of events and model a history of the network....
The basic concepts in this method are event and trace. Using the concept of event, the network traffic can be modeled through various events occurring in the network. Atrace is a list of events and model a history of the network....