9.1. Introduction

That security protocols required careful analysis was recognized very early on. It was also realized that just eyeballing a design until you got bored and had failed to spot an attack does not provide any good assurance that the design is sound. In this chapter we provide an overview of approaches that have been proposed to make the reasoning about security protocols more systematic and in many cases more formal and automated.

We make no claim that this is an exhaustive survey but seek to give what we hope is a representative sampling of techniques and give a flavour of the historical development of the subject. The descriptions will necessarily be rather shallow, but we hope that this will provide the reader with enough of ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.