A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
From Computationally-Proved Protocol Specifications to Implementations and Application to SSH
2013
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
This paper presents a novel technique for obtaining implementations of security protocols, proved secure in the computational model. We formally specify the protocol to prove, we prove this specification using the computationally-sound protocol verifier CryptoVerif, and we automatically translate it into an implementation in OCaml using a new compiler that we have implemented. We applied this approach to the SSH Transport Layer protocol: we proved the authentication of the server and the
doi:10.22667/jowua.2013.03.31.004
dblp:journals/jowua/CadeB13
fatcat:4v5farrgwbgobibgahki6m3p5m