| Abstract: |
In the world of designing security protocols, verification is a crucial step to
eliminate weaknesses and inaccuracies of eŽective
security protocols. There are many models
and tools to verify security protocols, including, Finite State Machines
(FMS), Colored Petri Nets (CP-Nets), Cryptographic
Protocol Analysis Language Evaluation System (CPAL-ES),
BAN Logic, Morphi, etc. In this work, we study CP-Nets model and show
how it can be used to analyze security protocols. As an example, we model
and verify Station-to-Station protocol (STS) using
CP-Nets. |