In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP. We use FDR to discover an attack upon the protocol, which allows an intruder to impersonate another agent. We adapt the protocol, and then use FDR to show that the new protocol is secure, at least for a small system. Finally we prove a result which tells us that if this small system is secure, then so is a system of arbitrary size.
Keywords
- Small System
- Security Protocol
- Arbitrary Size
- Cipher Block Chain
- Honest Agent
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.