National Repository of Grey Literature 7 records found  Search took 0.00 seconds. 
Methods of the Payment Protocols Design
Matúška, Peter ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This paper analyses some existing approaches in security and payment protocol design. It describes protocol design using simple BAN logic and using derivation system. Special attention is paid to composition method, which is based on the design of complicated protocols from small parts called primitives and it is demonstrated on design of purchase procedure of SET protocol. This method was automated and implemented in C++ language, which allows designer to generate set of candidate protocols according to his needs and this set can be further used for next phase of protocol design process.
Specifications Database of Security Protocols
Ondráček, David ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Original protocols, which were created during early development of computer networks, no longer provide sufficient security. This is the reason why new protocols are developed and implemented. The important component of this process is formal verification, which is used to analyze the developed protocols and check whether a successful attack is possible or not. This thesis presents selected security protocols and tools for their formal verification. Further, the selected protocols are specified in LySa calculus and results of their analysis using LySatool are presented and discussed.
Specifications Database of Security Protocols
Papež, Zdeněk ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis is about the security protocols which are necessary for safe communication in the Internet. There are various kinds of security protocols in use but this work covers only selection of most important of them. I have tried to gather all available information and work them out into uniform database which can be used for further processing. In my opinion, main aid of this work is precise description of knowledge baseand prediction base of each protocol. Also all possible conditions and states are described. The end of part of this work sums up all concerned protocols into a user-friendly table which is used in web-side database accessible from the Internet.
Specifications Database of Security Protocols
Papež, Zdeněk ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis is about the security protocols which are necessary for safe communication in the Internet. There are various kinds of security protocols in use but this work covers only selection of most important of them. I have tried to gather all available information and work them out into uniform database which can be used for further processing. In my opinion, main aid of this work is precise description of knowledge baseand prediction base of each protocol. Also all possible conditions and states are described. The end of part of this work sums up all concerned protocols into a user-friendly table which is used in web-side database accessible from the Internet.
Methods of the Payment Protocols Design
Matúška, Peter ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This paper analyses some existing approaches in security and payment protocol design. It describes protocol design using simple BAN logic and using derivation system. Special attention is paid to composition method, which is based on the design of complicated protocols from small parts called primitives and it is demonstrated on design of purchase procedure of SET protocol. This method was automated and implemented in C++ language, which allows designer to generate set of candidate protocols according to his needs and this set can be further used for next phase of protocol design process.
Specifications Database of Security Protocols
Hadaš, Petr ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This paper describes four tools for verification security protocols Athena, Casper, Isabelle and Murphi. Each tool is briefly characterized and implementation of protocol Needham Schroeder. One part of this paper is comparing of selected tools. The second part of this paper describes in detail a tool Athena and mentions examples of verified protocols. By each protocol is stated a specifications of communication, a detected attack and results of own verification. At the end compares this paper verification results with already publicated attacks.
Specifications Database of Security Protocols
Ondráček, David ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Original protocols, which were created during early development of computer networks, no longer provide sufficient security. This is the reason why new protocols are developed and implemented. The important component of this process is formal verification, which is used to analyze the developed protocols and check whether a successful attack is possible or not. This thesis presents selected security protocols and tools for their formal verification. Further, the selected protocols are specified in LySa calculus and results of their analysis using LySatool are presented and discussed.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.