<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf18404</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2007.193</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>An Integrative Framework to Protocol Analysis and Repair: Bellare–Rogaway Model + Planning + Model Checker<xref ref-type="fn" rid="fn1">
						<sup>✩</sup>
					</xref>
				</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Choo</surname>
						<given-names>Kim-Kwang Raymond</given-names>
					</name>
					<email xlink:href="mailto:raymond.choo@aic.gov.au">raymond.choo@aic.gov.au</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Australian Institute of Criminology, GPO Box 2944, Canberra ACT 2601 Australia</aff>
			</contrib-group>
			<author-notes>
				<fn id="fn1">
					<label>
						<sup>✩</sup>
					</label><p>The views and opinions expressed in this paper are those of the author and do not reflect those of the Australian Government and Australian Institute of Criminology. Research was performed while the author was with the Intelligent Systems Laboratory / University of Western Sydney.</p>
				</fn>
			</author-notes>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2007</year>
			</pub-date>
			<volume>18</volume>
			<issue>4</issue>
			<fpage>547</fpage>
			<lpage>568</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>12</month>
					<year>2006</year>
				</date>
			</history>
			<abstract>
				<p>A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verification Tool (SHVT), is then used to perform state-space analysis on the Automata in the setting of planning problem. The three-party identity-based secret public key protocol (3P-ID-SPK) protocol of Lim and Paterson (2006), which claims to provide explicit key authentication, is used as a case study. We then refute its heuristic security argument by revealing a previously unpublished flaw in the protocol using SHVT. We then show how our approach can automatically repair the protocol. This is, to the best of our knowledge, the first work that integrates an adversarial model from the computational complexity paradigm with an automated tool from the computer security paradigm to analyse protocols in an artificial intelligence problem setting – planning problem – and, more importantly, to repair protocols.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>key establishment protocols</kwd>
				<kwd>model checker</kwd>
				<kwd>key authentication</kwd>
				<kwd>provable security</kwd>
				<kwd>planning problem</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>