A Review on the Verification Approaches and Tools used to Verify the Correctness of Security Algorithms and Protocols

Abstract

Security algorithms and protocols are typical essential upgrades that must be involved within systems and their structures to provide the best performance. The protocols and systems should go through verification and testing processes in order to be more efficient and accurate. In the testing of software, traditional methods are used for accuracy check-up. However, this could not fulfill the measurement of all the testing requirements. The usage of formal verification approaches in checking security properties considers their best environment to be applied. The available literature discussed several approaches on developing the most robust formal verification methods for addressing and analyzing errors that face systems. This could be during the implantation process, unknown attacks, and nondeterministic adversary on the security protocols and algorithm. In this paper, a comprehensive review of the main formal verification approaches such as model checking and theorem approving has been conducted. Moreover, the use of verification tools was briefly presented and explained thoroughly. Those formal verification methods could be involved in the design, redesign of security protocols, and algorithms based on standards and determined sizes that is decided by these techniques’ analysis. The critical analysis of the methods used in verifying the security of systems showed that model checking approaches and its tools were the most used approaches among all the reviewed methods.

Authors and Affiliations

Mohammed Abdulqawi Saleh Al-humaikani, AuthorsLukman Bin Ab Rahim

Keywords

Related Articles

Development of Talent Model based on Publication Performance using Apriori Technique

The main problem or challenge faced by Human Resource Management (HRM) is to recognize, develop and manage talent efficiently and effectively. This is because HRM is responsible for selecting the correct talent for suita...

An Intelligent Diagnostic System for Congenital Heart Defects

Congenital heart disease is the most common birth defect. The article describes detection and classification of congenital heart defect using classification and regressing trees. The ultimate goal of this research can de...

Teaching Software Testing using Data Structures

Software testing is typically a rushed and neglected activity that is done at the final stages of software development. In particular, most students tend to test their programs manually and very seldom perform adequate t...

An Analysis of Cloud Computing Adoption Framework for Iraqi e-Government

This paper presents an analysis of the factors which could have possible affect over the adoption of cloud computing via the Iraqi e-government. A conceptual framework model for cloud computing within Iraqi e-government...

A Recurrent Neural Network and a Discrete Wavelet Transform to Predict the Saudi Stock Price Trends

Stock markets can be characterised as being complex, dynamic and chaotic environments, making the prediction of stock prices very tough. In this research work, we attempt to predict the Saudi stock price trends with rega...

Download PDF file
  • EP ID EP596739
  • DOI 10.14569/IJACSA.2019.0100621
  • Views 97
  • Downloads 0

How To Cite

Mohammed Abdulqawi Saleh Al-humaikani, AuthorsLukman Bin Ab Rahim (2019). A Review on the Verification Approaches and Tools used to Verify the Correctness of Security Algorithms and Protocols. International Journal of Advanced Computer Science & Applications, 10(6), 146-152. https://europub.co.uk/articles/-A-596739