Title: Protocol Verification And Analysis Using Colored Petri Nets
Published: August 2004
Authors: Salah Aly, Khaled Mustafa
Abstract: In the world of designing security protocols, verification is a crucial step to eliminate weaknesses and inaccuracies of e®ective security protocols. There are many models and tools to verify security protocols, including, Finite State Machines (FMS), Colored Petri Nets (CP-Nets), Cryptographic Protocol Analysis Language Evaluation System (CPAL-ES), BAN Logic, Morphi, etc. In this work, we study CP-Nets model and show how it can be used to analyze security protocols. As an example, we model and verify Station-to-Station protocol (STS) using CP-Nets.
Full Paper: [pdf]