Analysis of security protocols using finite-state machines

Aljeaid, D, Ma, X ORCID logoORCID: https://orcid.org/0000-0003-0074-4192 and Langensiepen, C ORCID logoORCID: https://orcid.org/0000-0002-0165-9048, 2015. Analysis of security protocols using finite-state machines. International Journal of Advanced Research in Artificial Intelligence (IJARAI), 4 (4), pp. 46-53. ISSN 2165-4069

[thumbnail of 219479_PubSub1926_Ma.pdf]
Preview
Text
219479_PubSub1926_Ma.pdf

Download (933kB) | Preview

Abstract

This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay.

Item Type: Journal article
Publication Title: International Journal of Advanced Research in Artificial Intelligence (IJARAI)
Creators: Aljeaid, D., Ma, X. and Langensiepen, C.
Publisher: Science and Information Organization Inc.
Date: 2015
Volume: 4
Number: 4
ISSN: 2165-4069
Identifiers:
Number
Type
10.14569/IJARAI.2015.040407
DOI
Rights: © 2015 The Science and Information (SAI) Organization Limited
Divisions: Schools > School of Science and Technology
Record created by: EPrints Services
Date Added: 09 Oct 2015 09:57
Last Modified: 09 Jun 2017 13:15
URI: https://irep.ntu.ac.uk/id/eprint/5361

Actions (login required)

Edit View Edit View

Statistics

Views

Views per month over past year

Downloads

Downloads per month over past year