Journal article icon

Journal article

Model checking cryptographic protocols subject to combinatorial attack.

Abstract:

We introduce an approach to model checking cryptographic protocols that use hashing too weak to resist combinatorial attacks. Typically such hashing is used when an extremely low bandwidth channel, such as a human user, is employed to transmit its output. This leads to two opportunities for attack: deducing a weak value from its properties and discovering alternative ways to produce a given weak value. The first of these proves a natural extension to established protocol modelling approaches,...

Expand abstract

Actions


Access Document


Files:

Authors


Publication date:
2011-01-01
URN:
uuid:52875969-f7ae-4575-a2be-558dbe46277a
Local pid:
cs:5266

Terms of use


Metrics


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP