Title
Understanding The Intruder Through Attacks On Cryptographic Protocols
Keywords
Attacks; Authentication; Security protocols; Verification
Abstract
The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable methods in the design of secure systems. Security protocols are one of the most important design parameters. History has proven security protocols to be vulnerable even after they enjoyed circumspect design and meticulous review by experts. We posit that understanding the subtle issues in security protocols is important when designing a protocol. In particular, understanding a penetrator and the knowledge of different attack strategies that a penetrator can apply are among the most important issues that affect the design of security protocols. We describe the notion of a penetrator and specify his characteristics. Our purpose is to emphasize the design criteria of an authentication protocol through the use of some nice and subtle attacks that existed in the literature in the field of the design of security protocols.
Publication Date
12-1-2006
Publication Title
Proceedings of the Annual Southeast Conference
Volume
2006
Number of Pages
667-672
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1145/1185448.1185594
Copyright Status
Unknown
Socpus ID
34248358177 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/34248358177
STARS Citation
Muhammad, Shahabuddin; Furqan, Zeeshan; and Guha, Ratan K., "Understanding The Intruder Through Attacks On Cryptographic Protocols" (2006). Scopus Export 2000s. 7728.
https://stars.library.ucf.edu/scopus2000/7728