An Analysis of a Public-Key Protocol with Membranes

Abstract : In this paper, we develop an analysis of the Needham-Schroeder Public-Key Protocol in the framework of membrane computing. This analysis is used to validate the protocol and exhibits, as expected, a well known logical attack. The novelty of our approach is to use multiset rewriting in a nest of membranes. The use of membranes enables to tight the conditions for detecting an attack. The approach has been validated by developing a full implementation for several versions of the analysis.
Complete list of metadatas
Contributor : Frédéric Davesne <>
Submitted on : Saturday, July 18, 2009 - 7:08:39 PM
Last modification on : Thursday, January 11, 2018 - 6:22:25 AM
Long-term archiving on : Monday, June 7, 2010 - 11:08:47 PM


Files produced by the author(s)



Olivier Michel, Florent Jacquemard. An Analysis of a Public-Key Protocol with Membranes. Ciobanu, G. and Paun, G. and Pérez-Jiménez, J. Applications of Membrane Computing, Springer Verlag, pp.283--302, 2005, Natural Computing Series, ⟨10.1007/3-540-29937-8⟩. ⟨hal-00340140⟩



Record views


Files downloads