LitMy.ru - литература в один клик

Modeling and Analyzing Security Protocols with Tamarin

  • Добавил: literator
  • Дата: 30-07-2025, 07:25
  • Комментариев: 0

Сбор на сервер (обновляется раз в сутки)

100%

Собрано 100571 ₽ из 100000 ₽


Название: Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide
Автор: David Basin, Cas Cremers, Jannik Dreier, Ralf Sasse
Издательство: Springer
Серия: Information Security and Cryptography
Год: 2025
Страниц: 320
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples witnessing attacks. Tamarin is a robust and powerful analysis tool: it has been under development for over a decade and has reached a state of maturity where it can be applied to model and analyze a wide range of real-world cryptographic protocols. It is now one of the leading tools in this domain, with a wide and active user community spanning both academia and industry.

The objective of this book is to help both researchers and practitioners to gain a general understanding of how Formal Methods tools like Tamarin can be used to analyze and improve the quality of real-world protocols. Moreover, we specifically showcase the Tamarin prover and provide guidance on its usage. In this sense, this book provides a user’s manual for Tamarin. But it goes far beyond that, highlighting Tamarin’s underlying theory and its use in modeling and applications.

This book emphasizes practical aspects of security protocol verification. Its intended audience is security researchers and engineers who work with such protocols and wish to learn how to rigorously specify and analyze them. This includes information security students learning about these protocols, industrial practitioners who design their own proprietary protocols, engineers involved in protocol standardization and related activities, and even teams that evaluate protocol designs in some fashion. We have written this book with this diverse audience in mind. As background, we assume some basic knowledge of formal modeling, e.g., modeling systems as state transition systems, as well as applied cryptography and its applications. However, we have kept other prerequisites to a minimum.

Скачать Modeling and Analyzing Security Protocols with Tamarin












[related-news] [/related-news]
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.