Journal article
Model checking cryptographic protocols subject to combinatorial attack.
- Abstract:
- We introduce an approach to model checking cryptographic protocols that use hashing too weak to resist combinatorial attacks. Typically such hashing is used when an extremely low bandwidth channel, such as a human user, is employed to transmit its output. This leads to two opportunities for attack: deducing a weak value from its properties and discovering alternative ways to produce a given weak value. The first of these proves a natural extension to established protocol modelling approaches, but for the second we require something more novel. We propose an approach based on taking snapshots of the intruder memory.
Actions
Authors
- Publication date:
- 2011-01-01
- UUID:
-
uuid:52875969-f7ae-4575-a2be-558dbe46277a
- Local pid:
-
cs:5266
- Deposit date:
-
2015-03-31
Terms of use
- Copyright date:
- 2011
If you are the owner of this record, you can report an update to it here: Report update to this record