Loading

Approaches to the Security Analysis of Authentication and Authorization Protocols in Distributed Systems
Igor S. Konstantinov1, Sergej A. Lazarev2, Vladimir E. Kiselev3, Alexander V. Demidov4

1Igor S. Konstantinov, Belgorod State University, Pobedy, Belgorod, Russia.

2Sergej A. Lazarev, Belgorod State University, Pobedy, Belgorod, Russia.

3Vladimir E. Kiselev, Belgorod State University, Pobedy, Belgorod, Russia.

4Alexander V. Demidov, Orel State University,  Komsomolskaya., Russia.

Manuscript received on 08 April 2019 | Revised Manuscript received on 15 April 2019 | Manuscript Published on 24 May 2019 | PP: 610-613 | Volume-8 Issue-6S3 April 2019 | Retrieval Number: F11210486S319/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this article, a review of the most used approaches for the formal analysis of distributed systems cryptographic protocols and software tools implemented on the basis of these approaches has been done. The article examines such approaches as model checking, theorem proving, and believe logic, provides a list of well-known tools for automating the analysis of cryptographic protocols within each approach. On the basis of the conducted research, it was concluded that there is no universal tool for verifying the security of distributed information and computing systems authorization and authentication protocols.

Keywords: Formal Verification; Authorization; Authentication; Model Checking; Logical Inference.
Scope of the Article: Community Information Systems