AGVI — Automatic Generation, Verification, and Implementation of Security Protocols

  • Dawn Song
  • Adrian Perrig
  • Doantam Phan
Conference paper

DOI: 10.1007/3-540-44585-4_21

Volume 2102 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Song D., Perrig A., Phan D. (2001) AGVI — Automatic Generation, Verification, and Implementation of Security Protocols. In: Berry G., Comon H., Finkel A. (eds) Computer Aided Verification. CAV 2001. Lecture Notes in Computer Science, vol 2102. Springer, Berlin, Heidelberg

Abstract

As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Verification, and Implementation of Security Protocols. With AGVI, the protocol designer inputs the system specification (such as cryptographic key setup) and security requirements. AGVI will then automatically find the near-optimal protocols for the specific application, proves the correctness of the protocols and implement the protocols in Java. Our experiments have successfully generated new and even simpler protocols than the ones documented in the literature.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Dawn Song
    • 1
  • Adrian Perrig
    • 1
  • Doantam Phan
    • 1
  1. 1.University of CaliforniaBerkeley