About Us Our Work Employment News & Events
MITRE Remote Access for MITRE Staff and Partners Site Map
Our Work

Follow Us:

Visit MITRE on Facebook
Visit MITRE on Twitter
Visit MITRE on Linkedin
Visit MITRE on YouTube
View MITRE's RSS Feeds
View MITRE's Mobile Apps
Home > Our Work > Technical Papers >

Searching for Shapes in Cryptographic Protocols

March 2007

Shaddin F. Doghmi, The MITRE Corporation
Joshua D. Guttman, The MITRE Corporation
F. Javier Thayer, The MITRE Corporation

ABSTRACT

A shape describes the behavior of the honest participants in some minimal protocol execution. These shapes are informative, because typically protocols have very few of them. Authentication and secrecy properties are easy to determine from the set of shapes, as are attacks, and other protocol characteristics.

A skeleton gives partial information about some possible executions, and a homomorphism from one skeleton to another is an informationpreserving map. We describe a procedure that searches through skeletons using homomorphisms. The search procedure has been implemented in a Cryptographic Protocol Shape Analyzer (CPSA).

View/Download Document

Additional Search Keywords

N/A

 

Page last updated: April 9, 2007   |   Top of page

Homeland Security Center Center for Enterprise Modernization Command, Control, Communications and Intelligence Center Center for Advanced Aviation System Development

 
 
 

Solutions That Make a Difference.®
Copyright © 1997-2013, The MITRE Corporation. All rights reserved.
MITRE is a registered trademark of The MITRE Corporation.
Material on this site may be copied and distributed with permission only.

IDG's Computerworld Names MITRE a "Best Place to Work in IT" for Eighth Straight Year The Boston Globe Ranks MITRE Number 6 Top Place to Work Fast Company Names MITRE One of the "World's 50 Most Innovative Companies"
 

Privacy Policy | Contact Us