Attacking Group Multicast Key Management Protocols Using Coral

@article{Steel2005AttackingGM,
  title={Attacking Group Multicast Key Management Protocols Using Coral},
  author={Graham Steel and Alan Bundy},
  journal={Electr. Notes Theor. Comput. Sci.},
  year={2005},
  volume={125},
  pages={125-144}
}
This paper describes the modelling of a two multicast group key management protocols in a first-order inductive model, and the discovery of attacks on them by the automated counterexample finder CORAL. It demonstrates the suitability of an inductive model for analysing such protocols. In the course of the case studies, we discuss the issues surrounding multicast protocol analysis, including identifying the goals of the protocol with respect to the intended trust model, modelling of the control… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

Verifying multicast-based security protocols using the inductive method

International Journal of Information Security • 2013
View 4 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 29 references

Similar Papers

Loading similar papers…