A Review on the Verification Approaches and Tools used to Verify the Correctness of Security Algorithms and Protocols
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
Security algorithms and protocols are typical essential upgrades that must be involved within systems and their structures to provide the best performance. The protocols and systems should go through verification and testing processes in order to be more efficient and accurate. In the testing of software, traditional methods are used for accuracy check-up. However, this could not fulfill the measurement of all the testing requirements. The usage of formal verification approaches in checking security properties considers their best environment to be applied. The available literature discussed several approaches on developing the most robust formal verification methods for addressing and analyzing errors that face systems. This could be during the implantation process, unknown attacks, and nondeterministic adversary on the security protocols and algorithm. In this paper, a comprehensive review of the main formal verification approaches such as model checking and theorem approving has been conducted. Moreover, the use of verification tools was briefly presented and explained thoroughly. Those formal verification methods could be involved in the design, redesign of security protocols, and algorithms based on standards and determined sizes that is decided by these techniques’ analysis. The critical analysis of the methods used in verifying the security of systems showed that model checking approaches and its tools were the most used approaches among all the reviewed methods.
Authors and Affiliations
Mohammed Abdulqawi Saleh Al-humaikani, AuthorsLukman Bin Ab Rahim
Development of Talent Model based on Publication Performance using Apriori Technique
The main problem or challenge faced by Human Resource Management (HRM) is to recognize, develop and manage talent efficiently and effectively. This is because HRM is responsible for selecting the correct talent for suita...
An Intelligent Diagnostic System for Congenital Heart Defects
Congenital heart disease is the most common birth defect. The article describes detection and classification of congenital heart defect using classification and regressing trees. The ultimate goal of this research can de...
Teaching Software Testing using Data Structures
Software testing is typically a rushed and neglected activity that is done at the final stages of software development. In particular, most students tend to test their programs manually and very seldom perform adequate t...
An Analysis of Cloud Computing Adoption Framework for Iraqi e-Government
This paper presents an analysis of the factors which could have possible affect over the adoption of cloud computing via the Iraqi e-government. A conceptual framework model for cloud computing within Iraqi e-government...
A Recurrent Neural Network and a Discrete Wavelet Transform to Predict the Saudi Stock Price Trends
Stock markets can be characterised as being complex, dynamic and chaotic environments, making the prediction of stock prices very tough. In this research work, we attempt to predict the Saudi stock price trends with rega...