%0 Journal Article %T Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions %J The ISC International Journal of Information Security %I Iranian Society of Cryptology %Z 2008-2045 %A Ramezanian, R. %D 2009 %\ 01/28/2009 %V 1 %N 1 %P 55-67 %! Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions %K Authentication %K Process Algebra %K Parallel Sessions %K Security %R 10.22042/isecure.2015.1.1.6 %X Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authentication for parallel multiple session's execution. To model the authentication, two main notions called 1. agent's scope and 2. agent's recognizability are introduced, which consider the difference of ability of agents due to their different roles in the protocol and different access to keys and secrets. To formalize above notions, a process algebra provided by some primitives for manipulating cryptographic messages is used. We formalize some security protocols and examine our definition of authentication for them. We just discuss the symmetric key case. %U https://www.isecure-journal.com/article_39166_1c551feb113b3ae95c92a8aabb86dd90.pdf