OXFORD UNIVERSITY  COMPUTING LABORATORY

CSP files for Analysis of the TESLA Protocol


The CSP scripts linked from this page relate to the paper
Analysing a Stream Authentication Protocol using Model Checking.
Philippa Broadfoot and Gavin Lowe. In Proceedings of the 7th European Symposium on Research in Computer Security (ESORICS), 2002.
There are two CSP scripts available:
  • TESLA1.csp: The model without key chaining and re-authentication;

  • TESLA2.csp: The model with key chaining and re-authentication.
Random Image
Random Image
Random Image