Skip to content

Latest commit

 

History

History
8 lines (5 loc) · 774 Bytes

File metadata and controls

8 lines (5 loc) · 774 Bytes

Comparison of Tools for the Verification of Cryptographic Protocols

This repository is about the final essay for the Computer Network Security master degree course I attended as a Bachelor student.

Three security protocol analysis tools will be compared: Proverif, Tamarin-prover and Verifpal. All of these tools employ a symbolic model.

Cited by

  • M. Jarosz, K. Wrona and Z. Zieliński, "Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices," 2022 17th Conference on Computer Science and Intelligence Systems (FedCSIS), 2022, pp. 617-625, doi: 10.15439/2022F169.