Ask a Question

Prefer a chat interface with context about you and your work?

The inductive approach to verifying cryptographic protocols

The inductive approach to verifying cryptographic protocols

Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding …