loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Siraj Shaikh and Vicky Bush

Affiliation: University of Gloucestershire Business School, United Kingdom

Abstract: Designing security protocols is a challenging and deceptive exercise. Even small protocols providing straightforward security goals, such as authentication, have been hard to design correctly, leading to the presence of many subtle attacks. Over the years various formal approaches have emerged to analyse security protocols making use of different formalisms. Schneider has developed a formal approach to modeling security protocols using the process algebra CSP. He introduces the notion of rank functions to analyse the protocols. We demonstrate an application of this approach to the Woo-Lam protocol. We describe the protocol in detail along with an established attack on its goals. We then describe Schneider’s rank function theorem and use it to analyse the protocol.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 44.197.114.92

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Shaikh, S. and Bush, V. (2005). Analysing the Woo-Lam protocol using CSP and rank functions. In Proceedings of the 3rd International Workshop on Security in Information Systems (ICEIS 2005) - WOSIS; ISBN 972-8865-25-2, SciTePress, pages 3-12. DOI: 10.5220/0002557000030012

@conference{wosis05,
author={Siraj Shaikh. and Vicky Bush.},
title={Analysing the Woo-Lam protocol using CSP and rank functions},
booktitle={Proceedings of the 3rd International Workshop on Security in Information Systems (ICEIS 2005) - WOSIS},
year={2005},
pages={3-12},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002557000030012},
isbn={972-8865-25-2},
}

TY - CONF

JO - Proceedings of the 3rd International Workshop on Security in Information Systems (ICEIS 2005) - WOSIS
TI - Analysing the Woo-Lam protocol using CSP and rank functions
SN - 972-8865-25-2
AU - Shaikh, S.
AU - Bush, V.
PY - 2005
SP - 3
EP - 12
DO - 10.5220/0002557000030012
PB - SciTePress