PHILADELPHIA UNIVERSITY
      L i b r a r y    &    I n f o r m a t i o n     R e s o u r c e s
     

 



 

 

  ONLINE CATALOGUE

        
         Improved SPI calculus for reasoning on cryptographic protocols
 

 
Parallel Title   لغة ال SPI الرياضية المحسنة لتحليل بروتوكولات التشفير
Author   Bani Hani,Saleh Mansour (Author)
Al-Refai,Hasan (Supervisor)
Maouche,Mourad (Supervisor)
Responsibility Data   by Saleh Mansour Bani Hani; Hasan Al-Refai, supervisor, Mourad Maouche, co-supervisor
Publication Data   Amman: Philadelphia University, 2012
Physical Description   xi, 73 Leaves ; 28 cm.
Notes   - Thesis (MSc. in computer science) -- Philadelphia University, 2012.
Subject Area   Computer
Abstract   Most of cryptographic protocols are subjected to very suitable attacks. Therefore, many researches have developed tools to model and analyze protocols to guarantee their security properties. Among these developed tools, the spi calculus has proved to be powerful formal method have useful for analyzing and reasoning on cryptographic protocols. However, such research work assumed that the environment will be restricted to some predefined rules and assumptions with out solving the case of interacting with real system that matched with such restrictions. In this thesis, we introduced an improved version of spi calculus called the Ph-spy calculus. Such calculus provides the ability for evaluating each action in the running processes and making suitable decision to be more suitable with open environment. Therefore, we have enhanced the evaluation function to make it capable for making suitable decisions to handle the open and changeability in environment behavior as well as evaluating and validating very action in protocol process for proving the main security properties as authentication and confidentiality. In the Ph-spy calculus, the message in structured to be the same as in real protocols that have a tuple of messages. Also, it includes all operators needed for such as timestamp, hash function, digital signature and asymmetric key cryptosystem. Hence, Ph-spi calculus ready is to be used for real protocols such as e-commerce protocols. ... |
Abstract Download PDF
Subject Headings   Computer science Cryptography
Call Number   004 BAN

 

 Item Information

CopyBarcodeReg #Volume IDItem StatusDue DateLocationMedia Type
1 117236 117236 REFERENCE * Special Collections - Ground floor PRINT
2 119559 119559 REFERENCE * Special Collections - Ground floor PRINT
3 128381 128381 REFERENCE * Special Collections - Ground floor PRINT

      |  Return to Search Form   

Item Status With (*). cannot be charged

                        للبحث في المقتنيات العربية      بحث عربي                   

 

For more information, please contact the Library Administration

Designed By : Shadi A. Kfouf * Databases & Information Services Section ©2005 All Rights Reserved.