Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN

@article{AlAzzoni2005ModelingAV,
  title={Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN},
  author={Issam Al-Azzoni and Douglas G. Down and Ridha Kh{\'e}dri},
  journal={Nord. J. Comput.},
  year={2005},
  volume={12},
  pages={200-228}
}
In this paper, we present a technique to model and analyse cryptographic protocols using coloured Petri nets. A model of the protocol is constructed in a top-down manner: first the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to reduce the size of the occurrence graph. A smaller occurrence graph facilitates deducing whether particular security goals are met. 
Highly Cited
This paper has 43 citations. REVIEW CITATIONS