0.12. Summary
CSP has been shown to be a very effective framework in which to formulate the behaviour and properties of security goals. The CSP framework readily encompasses a whole host of different architectures, mechanisms and security properties. Furthermore, the model-checking technique based on FDR has been shown to be very effective in identifying vulnerabilities.
When faced with a new security protocol for evaluation a good methodology is as follows:
Establish exactly how the protocol works and what security properties it is intended to provide and against which threats.
Examine it for obvious flaws. It can be surprising how much can be picked up just by eyeballing a protocol.
Once any obvious flaws are eliminated then try to analyze the ...
Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.