• DocumentCode
    2990754
  • Title

    Verifiable-text attacks in cryptographic protocols

  • Author

    Gong, Li

  • Author_Institution
    Comput. Lab., Cambridge Univ., UK
  • fYear
    1990
  • fDate
    3-7 Jun 1990
  • Firstpage
    686
  • Abstract
    The author introduces a form of attack, a verifiable-test attack, in which an attacker obtains secret information, such as a password used in a protocol, without breaking the underlying cryptosystem. An investigation is made of the essence of a verifiable-text attack, and an algorithm for examining protocols and searching for vulnerabilities to such an attack is developed. Caution has to be exercised in certifying that a protocol is not vulnerable because a healthy protocol may become vulnerable when it interacts with another vulnerable or even healthy protocol
  • Keywords
    cryptography; protocols; algorithm; cryptographic protocols; password; verifiable-test attack; Authentication; Cryptographic protocols; Cryptography; Dictionaries; Graph theory; Internet; Laboratories; Shape; Space exploration; Trademarks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM '90, Ninth Annual Joint Conference of the IEEE Computer and Communication Societies. The Multiple Facets of Integration. Proceedings, IEEE
  • Conference_Location
    San Francisco, CA
  • Print_ISBN
    0-8186-2049-8
  • Type

    conf

  • DOI
    10.1109/INFCOM.1990.91310
  • Filename
    91310