DocumentCode
2990754
Title
Verifiable-text attacks in cryptographic protocols
Author
Gong, Li
Author_Institution
Comput. Lab., Cambridge Univ., UK
fYear
1990
fDate
3-7 Jun 1990
Firstpage
686
Abstract
The author introduces a form of attack, a verifiable-test attack, in which an attacker obtains secret information, such as a password used in a protocol, without breaking the underlying cryptosystem. An investigation is made of the essence of a verifiable-text attack, and an algorithm for examining protocols and searching for vulnerabilities to such an attack is developed. Caution has to be exercised in certifying that a protocol is not vulnerable because a healthy protocol may become vulnerable when it interacts with another vulnerable or even healthy protocol
Keywords
cryptography; protocols; algorithm; cryptographic protocols; password; verifiable-test attack; Authentication; Cryptographic protocols; Cryptography; Dictionaries; Graph theory; Internet; Laboratories; Shape; Space exploration; Trademarks;
fLanguage
English
Publisher
ieee
Conference_Titel
INFOCOM '90, Ninth Annual Joint Conference of the IEEE Computer and Communication Societies. The Multiple Facets of Integration. Proceedings, IEEE
Conference_Location
San Francisco, CA
Print_ISBN
0-8186-2049-8
Type
conf
DOI
10.1109/INFCOM.1990.91310
Filename
91310
Link To Document