DocumentCode :
2417151
Title :
Attacks are Protocols Too
Author :
Hagalisletto, Anders Moen
Author_Institution :
Dept. of Informatics, Oslo Univ.
fYear :
2007
fDate :
10-13 April 2007
Firstpage :
1197
Lastpage :
1206
Abstract :
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe is run inside a malicious agent communicating with normal agents. The simulator is also able to detect flaws in attacks: a previously unreported error on an attack on the Shamir Rivest Adelman is detected by simulation
Keywords :
cryptographic protocols; public key cryptography; Needham-Schroeder public key protocol; Shamir Rivest Adelman protocols; attack simulation; authentication protocols; flaw detection; malicious agent; Analytical models; Authentication; Computational modeling; Cryptographic protocols; Cryptography; Explosions; High level languages; Logic; Security; State-space methods;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on
Conference_Location :
Vienna
Print_ISBN :
0-7695-2775-2
Type :
conf
DOI :
10.1109/ARES.2007.46
Filename :
4159927
Link To Document :
بازگشت