A previous study showed how control flow analysis can be applied to analyse key distribution protocols based on symmetric key cryptography. We have extended both the theoretical treatment and our fully automatic verifier to deal with protocols based on asymmetric cryptography. This paper reports on the application of our technique - exemplified on the Beller-Chang-Yacobi MSR protocol, which uses both symmetric and asymmetric cryptography - and show how we discover an undocumented flaw.
|Title of host publication||Proceedings of Workshop on Issues in the Theory of Security (WITS 04)|
|Publication status||Published - 2004|