30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.4. CONCLUSION 55<br />

2.4 Conclusion<br />

In this chapter, we have presented the basic notions that we will use in the next<br />

chapters. Mainly, we showed how cryptographic protocols are symbolically<br />

modeled, <strong>and</strong> how to reduce the insecurity problem <strong>of</strong> cryptographic protocols<br />

with bounded number <strong>of</strong> sessions to the satisfiability problem <strong>of</strong> constraint<br />

systems. In the next chapters, we will relax the perfect cryptography assumption<br />

by taking into account some algebraic properties <strong>of</strong> cryptographic primitives, <strong>and</strong>,<br />

following the symbolic approach given in this chapter, we will analyse cryptographic<br />

protocols in the presence <strong>of</strong> some algebraic operators.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!