We introduce an approach to model checking cryptographic protocols that use hashing too weak to resist combinatorial attacks. Typically such hashing is used when an extremely low bandwidth channel, such as a human user, is employed to transmit its output. This leads to two opportunities for attack: deducing a weak value from its properties and discovering alternative ways to produce a given weak value. The first of these proves a natural extension to established protocol modelling approaches,...Expand abstract
- Publication date:
- Local pid:
- Copyright date:
Model checking cryptographic protocols subject to combinatorial attack.
Views and Downloads
If you are the owner of this record, you can report an update to it here: Report update to this record