Computer Aided Verification

Volume 2102 of the series Lecture Notes in Computer Science pp 241-245


AGVI — Automatic Generation, Verification, and Implementation of Security Protocols

  • Dawn SongAffiliated withUniversity of California
  • , Adrian PerrigAffiliated withUniversity of California
  • , Doantam PhanAffiliated withUniversity of California

* Final gross prices may vary according to local VAT.

Get Access


As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Verification, and Implementation of Security Protocols. With AGVI, the protocol designer inputs the system specification (such as cryptographic key setup) and security requirements. AGVI will then automatically find the near-optimal protocols for the specific application, proves the correctness of the protocols and implement the protocols in Java. Our experiments have successfully generated new and even simpler protocols than the ones documented in the literature.