ABSTRACT

This chapter discusses the basic concept of time complexity, space complexity and energy consumption. Analytical tools like Automated Validation of Internet Security Protocol and Applications (AVISPA), ProVerif and BAN-Logic help researchers validate security protocol designed by him/her and verify whether any attacks are available or not. The chapter examines the examples of Needham-Schroeder public key protocol to show the implementation of this tools. Algorithm analysis provides understanding about behavior of an algorithm in terms resource consumption. There are many different tools developed to verify security level of developed protocols. The chapter explores how tools work and what are the inner functions that make one better than another. In 2006, A. Armando and D. Basic with other authors developed a tool called as a AVISPA. It has detected almost all well-known attacks like man in the middle attack or forgery attack, but also at the same time has shown various new attacks for the input protocols.