Guttman, Joshua D.
This paper describes algorithms for use with the Cryptographic Protocol Shape Analyzer to automate and simplify tasks relating to cryptographic protocol analysis. A Python implementation of these algorithms is provided and documented. The tools developed in this project will be useful to both protocol designers and students looking to gain an understanding in trust engineering.
Worcester Polytechnic Institute
Major Qualifying Project
All authors have granted to WPI a nonexclusive royalty-free license to distribute copies of the work, subject to other agreements. Copyright is held by the author or authors, with all rights reserved, unless otherwise noted.