Output details
11 - Computer Science and Informatics
University of Oxford
A Framework for Compositional Verification of Security Protocols
<10>
The time needed to analyse a security protocol is exponential in its size, making a compositional approach desirable. This paper presents a compositional approach for the verification of security protocols, developing a number of theorems that aid in establishing the security of a composed protocol from the security of its components. For each of these theorems, formal proofs are provided. We apply the framework to key establishment in the WIMAX protocol, which was previously considered infeasible for verification. Our framework enables us to show correctness of the WIMAX composition using a high degree of automation.
A preliminary, unrefereed Technical Report was available online from 2006. This was not submitted to RAE 2008.