Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
The Cryptographic Protocol Analysis Language Evaluation System (CPAL-ES) is a tool used to analyze protocols with formal methods. In this thesis, we exercise CPAL-ES against two security protocols, the Secure Protocol of Aziz & Diffie, and IEEE 802.1X Standard protocol. Analyzing cryptographic protocols with formal methods assist us not only finding the flaws but also in understanding them. CPAL-ES is a nice tool to analyze protocols with formal methods. It has an ability to evaluate not only protocols works in wired environment but also wireless protocols. Our analysis with CPAL-ES makes it possible to explore protocol attacks, prove protocol correctness, and analyze protocols in great detail, as well as test the capabilities of CPAL-ES on the wireless protocols. We discuss and analyze several protocols, including The Secure Protocol and IEEE 802.1X Standard protocol, and show how attacks and solutions are simulated on these protocols with Cryptographic Protocol Analysis Language (CPAL). We also discuss the analysis of the interactions between the sub-protocols (EAP and RADIUS) in IEEE 802.1X Standard protocol. Our analysis of the attacks on the IEEE 802.1X Standard protocol proved that even though it is a useful protocol for wireless LANs, it is not secure. However, the Secure Protocol has strong confidentiality but is computationally expensive due to the public key infrastructure.
A Thesis submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Science.
Includes bibliographical references.
Alec Yasinsac, Professor Directing Thesis; Ladislav Kohout, Committee Member; Robert A. van Engelen, Committee Member.
Florida State University
Use and Reproduction
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). The copyright in theses and dissertations completed at Florida State University is held by the students who author them.