Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Air Force Institute of Technology

Theses/Dissertations

2004

Computer networks--Security measures

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Automating Security Protocol Analysis, Stephen W. Mancini Mar 2004

Automating Security Protocol Analysis, Stephen W. Mancini

Theses and Dissertations

When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol 24, it took over 18 years to discover that even with the most secure encryption, the conversations using this protocol were still subject to penetration. To date, there is still no one protocol that is accepted for universal use. Because of this, analysis of the protocol outside the encryption is becoming more important. Recent work by Joshua Guttman and others 9 have identified several properties that good protocols often exhibit. Termed Authentication Tests, these properties have been very useful in examining protocols. The purpose of this research is …