1
Formal Methods for Security Protocol
1. Introduction
Security protocols use cryptographic primitives as build blocks in order to achieve
security goals such as the authentications, confidentiality and the integrity. Cryptographic
primitive are from the perspective of a software developer in atomic cryptographic
operations. They are number of hashing operations which are being used to safeguard
information such as the MD5, SHA-1, SHA-256, SHA-512 are the most common used.
They are other types of the cryptographic operations which are also used these includes
symmetric schemes such as the AES, asymmetric like public key systems and the digital
signatures like the HMACs. The security protocols are well known to be difficult for one
to get right. They are many protocols which are proposed by different kind of the literature
while as many protocols are exploited in the practice and they are turned and they are
flawed but since their well functions ware made on the base implicit assumptions.
They are number of approaches which have been put a place for formal verifications
of the security protocols in order to overcome the problems of faulty implementations and
hidden requirements. They are number of methods used for the formal verifications of the
security protocols such as the BAN- logic, strand spaces and the Casper/ FDR-approaches.
All those three methods plus other not mentioned they abstract a way from cryptographic
details. Never the less they take for granted that other suitable cryptographic primitives
such as the decryption and encryptions, verifications and the digital signatures are given
and they are cryptographic safe. Putting into consideration that no software or application