Use this URL to cite or link to this record in EThOS:
Title: Oh!... is it really you? : using rank functions to verify authentication protocols
Author: Heather, James
Awarding Body: Royal Holloway, University of London
Current Institution: Royal Holloway, University of London
Date of Award: 2000
Availability of Full Text:
Access through EThOS:
Access through Institution:
A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each has its strengths, but the weaknesses of each are all too apparent. Model checking suffers from the problem of being able to check only a finite system; theorem proving is difficult to automate and often produces no conclusive results. Schneider's previous work on rank functions provides a formal approach to verification of certain properties of a security protocol. In this thesis, we develop the theory to allow for an arbitrarily large network, and give a clearly defined decision procedure by which one may either construct a rank function, proving correctness of the protocol, or show that no rank function exists. We show how the algorithm may be implemented to give a means of analysing authentication protocols that avoids the inherent limitations of both model checking and theorem proving. We discuss the implications of the absence of a rank function, and the open question of completeness of the rank function theorem.
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID:  DOI: Not available