In this paper,the running modes of the two-party cryptographic protocols are used to analyze the two authentication and key agreenment protocols,and attack on the protocols is discovered. Finally,two improved protocol...
Model checking can aid the design,analysis,and verification of the cryptographic protocols used over open networks and distributed systems. In this paper we give a survey of the state of model checking to the analysis...