RUS  ENG
Full version
JOURNALS // Intelligent systems. Theory and applications // Archive

Intelligent systems. Theory and applications, 2022 Volume 26, Issue 2, Pages 85–144 (Mi ista408)

Part 3. Mathematical models

Mathematical model and methods of verification of cryptographic protocols

A. M. Mironov

Lomonosov Moscow State University, Faculty of Mechanics and Mathematics

Abstract: In this paper, a new mathematical model of cryptographic protocols is presented, and examples of the application of this model for solving problems of verification of cryptographic protocols are given. Cryptographic protocols are distributed algorithms designed to enable the transmission of confidential information in an insecure environment. They are used, for example, in electronic payments, electronic voting procedures, systems for accessing confidential data, etc. Errors in cryptographic protocols can lead to great damage, therefore it is necessary to use mathematical methods to substantiate the various properties of correctness and security of cryptographic protocols. The paper outlines new methods for formal verification of cryptographic protocols.

Keywords: cryptographic protocols, sequential processes, distributed processes, verification.



© Steklov Math. Inst. of RAS, 2026