Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10329778 | Electronic Notes in Theoretical Computer Science | 2005 | 17 Pages |
Abstract
We revisit the analysis of the ASW contract signing protocol and use a unified view of the protocol as a whole as a basis to reason about the protocol and its objectives. This line of reasoning yields a simpler and clearer model of agents and protocol objectives which is within the scope of standard security analysis methods, as it does not require fairness constraints and uses only standard authentication and secrecy properties. We also analyse this model for finitely and infinitely many sessions of the protocol using the automated analysis tools OFMC and its extension OFMC-FP.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
Paul Hankes Drielsma, Sebastian Mödersheim,