2006 | OriginalPaper | Chapter
An Analysis of a Public Key Protocol with Membranes
Authors : Olivier Michel, Florent Jacquemard
Published in: Applications of Membrane Computing
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
We develop an analysis of the Needham-Schroeder public key protocol in the framework of membrane computing. This analysis is used to validate the protocol and exhibits, as expected, a well known logical attack. The novelty of our approach is to use multiset rewriting in a nest of membranes. The use of membranes enables us to make airtight the conditions for detecting an attack. The approach has been validated by developing a full implementation for several versions of the analysis.