Analyzing Encryption Protocols Using Formal Verification Techniques (Extended Abstract)

  • Richard A. Kemmerer
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 293)


Much work has been done in the area of analyzing encryption algorithms, such as DES [Dav 81.Bri 85.BMP 861]. A vast amount of work has also been expended on formally verifying com- munication protocols [IEE 82,STE 82,RW 83.LS 84.Hol 871]. In contrast, very little work has been devoted to the analysis and formal verification of encryption protocols.


Encryption Algorithm Formal Verification Cryptographic Operation Secret Master Formal Specification Language 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [Bri 85]
    Brickell, Ernest F. “Breaking Iterated Knapsacks,” Advances in Cryptology: Proceedings of Crypto 84. Lecture Notes in Computer Science, Springer-Verlag, New York. 1985.Google Scholar
  2. [BMP 86]
    Brickell, E.F., J.H. Moore, and M.R. Purtill, “Structure of the S-Boxes of the DES.” Proceedings of CRYPTO 86, Santa Barbara, California, August 1986.Google Scholar
  3. [CDL 85]
    Crow. J., D. Denning, P. Ladkin, M. Melliar-Smith. J. Rushby, R. Schwartz. R. Shostak, and F. von Henke. “SRI Verification System Version 2.0 Specification Language Description.” SRI International Computer Science Laboratory, Menlo Park, California, November 1985.Google Scholar
  4. [Dav 81]
    Davies, Donald W., “Some Regular properties of the ‘Data Encryption Standard’ Algorithm.” Proceedings of CRYPTO 81, Advances in Cryptography. Department of Electrical and Computer Engineering Report, ECE 82-04, Santa Barbara, California, August 1986.Google Scholar
  5. [EK 85]
    Eckmann, Steven T., and Richard A. Kemmerer, “INATEST: An Interactive Environment for Testing Formal Specifications,” Third Workshop on Formal Verification, Pajaro Dunes, California, February, 1985, ACM — Software Engineering Notes, Vol. 10, No. 4, August 1985.Google Scholar
  6. [GDS 84]
    Good, D.I., B.L. DiVito, and M.K. Smith, “Using the Gypsy Methodology,” Institute For Computing Science, University Of Texas, June 1984.Google Scholar
  7. [Hol 87]
    Holzmann, Gerard J., “Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching,” IEEE Transactions on Software Engineering, Vol. SE-13. No. 6. June 1987.Google Scholar
  8. [IEE 82]
    Sunshine, Carl A. (Editor), Special Issue on Protocol Specification and Verification, IEEE Transactions on Communications, Vol. COM-30, No. 12. December 1982.Google Scholar
  9. [Kern 85]
    Kemmerer, Richard A., “Testing Formal Specifications to Detect Design Errors,” IEEE Transactions on Software Engineering, Vol. SE-11, No. 1. January 1985.Google Scholar
  10. [LS 84]
    Lam, Simon S., and A. Udaya Shankar, “Protocol Verification Via Projections,” IEEE Transactions on Software Engineering, Vol. SE-10, No. 4, July 1984.Google Scholar
  11. [MM 80]
    Meyer, Carl H., and Stephen M. Matyas, Cryptography. John Wiley, 1980.Google Scholar
  12. [MCF 87]
    Millen, Jonathan K., Sidney C. Clark, and Sheryl B. Freedman, “The Interrogator: Protocol Security Analysis,” IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, February 1987.Google Scholar
  13. [Rob 79]
    Robinson, L., “The HDM Handbook, Vol 1: The Foundations Of HDM,” Computer Science Laboratory, SRI International, Menlo Park, California, June 1979.Google Scholar
  14. [RW 83]
    Rudin, H., and C.H. West (Editors), Protocol Specification, Testing, and Verification III Elsevier Science Publishers B.V., North-Holland, 1983.Google Scholar
  15. [SAM 86]
    Scheid, J., S. Anderson, R. Martin, and S. Holtsberg. “The Ina Jo Specification Language Reference Manual,” SDC document, System Development Corporation, Santa Monica, California, January 1986.Google Scholar
  16. [Sim 85]
    Simmons, C.J., “How to (Selectively) Broadcast a Secret.” Proceedings IEEE Symposium on Security and Privacy, Oakland, California, April 1985.Google Scholar
  17. [STE 82]
    Sunshine, Carl A., David H. Thompson, Roddy W. Erickson, and Susan L. Cerhart. “Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models.” IEEE Transactions on Software Engineering, Vol. SE-8, No. 5. September 1982.Google Scholar
  18. [TE 81]
    Thompson, D.H. and R.W. Erickson. eds. “Affirm Reference Manual,” USC Information Sciences Institute. Marina del Rey, California, February 1981.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1988

Authors and Affiliations

  • Richard A. Kemmerer
    • 1
  1. 1.Department of Computer ScienceUniversity of CaliforniaSanta Barbara

Personalised recommendations