1 research outputs found
Formal verification of a type flaw attack on a security protocol using object-z
We have identified a type flaw attack on the Amended Need-ham Schroeder Protocol with Conventional Keys due to a potential over-sight at the presentation layer of the network architecture. Using Object-Z, a formal specification of the protocol is presented allowing us to state the assumed properties of the presentation layer explicitly. Object-Z's schema calculus is used to verify the attack we have found and the weaknesses upon which the attack depends, thus enabling us to minimise the effort required to prevent the attack and to specify this as part of the model accordingly