0.12. Summary

CSP has been shown to be a very effective framework in which to formulate the behaviour and properties of security goals. The CSP framework readily encompasses a whole host of different architectures, mechanisms and security properties. Furthermore, the model-checking technique based on FDR has been shown to be very effective in identifying vulnerabilities.

When faced with a new security protocol for evaluation a good methodology is as follows:

  • Establish exactly how the protocol works and what security properties it is intended to provide and against which threats.

  • Examine it for obvious flaws. It can be surprising how much can be picked up just by eyeballing a protocol.

  • Once any obvious flaws are eliminated then try to analyze the ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.