Title :
Uncovering attacks on security protocols
Author_Institution :
Nat. Chiao Tung Univ., Hsinchu, Taiwan
Abstract :
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we can uncover attacks on a security protocol that are possible with no more than a given number of rounds. Though our approach is exhaustive testing, the majority of fruitless search is cut off by selecting a small number of representative values that could be sent by an attacker. Hence, the number of scenarios is relatively small and our method is quite practical. Furthermore, our method not only reports possible attacks but also describes the attacks in great detail. This description would be very helpful to protocol designers and analyzers.
Keywords :
PROLOG; cryptography; protocols; telecommunication security; Prolog-like language; operational semantics; secure communication; security protocol; Algorithm design and analysis; Communication channels; Communication system security; Cryptography; Information security; Knowledge based systems; National security; Niobium; Protocols; Testing;
Conference_Titel :
Information Technology and Applications, 2005. ICITA 2005. Third International Conference on
Print_ISBN :
0-7695-2316-1
DOI :
10.1109/ICITA.2005.292