Title

Understanding The Intruder Through Attacks On Cryptographic Protocols

Keywords

Attacks; Authentication; Security protocols; Verification

Abstract

The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable methods in the design of secure systems. Security protocols are one of the most important design parameters. History has proven security protocols to be vulnerable even after they enjoyed circumspect design and meticulous review by experts. We posit that understanding the subtle issues in security protocols is important when designing a protocol. In particular, understanding a penetrator and the knowledge of different attack strategies that a penetrator can apply are among the most important issues that affect the design of security protocols. We describe the notion of a penetrator and specify his characteristics. Our purpose is to emphasize the design criteria of an authentication protocol through the use of some nice and subtle attacks that existed in the literature in the field of the design of security protocols.

Publication Date

12-1-2006

Publication Title

Proceedings of the Annual Southeast Conference

Volume

2006

Number of Pages

667-672

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

DOI Link

https://doi.org/10.1145/1185448.1185594

Socpus ID

34248358177 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/34248358177

This document is currently not available here.

Share

COinS