Analyzing Encryption Protocols Using Formal Verification Authentication Schemes.
Richard A. KemmererPublished in: CRYPTO (1987)
Keyphrases
- formal verification
- cryptographic protocols
- encryption decryption
- security properties
- key agreement
- model checking
- authentication protocol
- mutual authentication
- key distribution
- security analysis
- secret key
- key exchange
- model checker
- identity authentication
- private information retrieval
- public key cryptography
- automated verification
- key management
- integrity verification
- private key
- image authentication
- data encryption
- bounded model checking
- authentication scheme
- security requirements
- provably secure
- security services
- symbolic model checking
- key agreement protocol
- security protocols
- public key
- elliptic curve cryptography
- program slicing
- secure communication
- virtual private network
- encryption scheme
- graphical password
- trusted third party
- diffie hellman
- digital signature
- privacy protection