作者: V. S. Suku Nair , Krishnan G. Indiradevi
DOI:
关键词:
摘要: Authentication protocols help to establish trust about the identities of communicating entities. Along with authorization and data confidentiality, authentication forms a critical component most non-trivial security frameworks. Over past several years, an alarming number seemingly secure have been shown be flawed. By exploiting such flaws, malicious entities can potentially take on trusted Attacks are often too subtle uncover by simple means, hence considerable research has gone into techniques for analyzing verifying them. Though problem is perhaps best studied using formal methods, in that category generally rather complex specialized. This paper proposes different approach - simulation as means validation. unable conclusively prove security, very effective uncovering hidden flaws. could particularly useful large systems where it may nearly impractical apply methods. A framework presented model state machines validate some their properties through simulation.