8.6. Summary

In this chapter we have introduced the notion of safe simplifying transformations: transformations that have the property of preserving attacks. We have produced sufficient conditions for a transformation to be safe and used this result to show that a number of transformations are indeed safe. We have illustrated these techniques by applying them to a large commercial protocol, simplifying this down to a size that can be modelled and analyzed. Attacks that are found can be traced back to the original protocol to see if they are feasible.

The theory of safe simplifying transformations was originally presented in [60]. In order to make the simplifying transformations easier to apply (particularly the swapping and coalescing pairs ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.