Results 1 - 10
of
3,542,855
Random polynomial-time attacks and Dolev-Yao models
- JOURNAL OF AUTOMATA, LANGUAGES AND COMBINATORICS
, 2005
"... In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao models can be seen as transition systems, possibly infinite. We then extend these transition systems with computation tim ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao models can be seen as transition systems, possibly infinite. We then extend these transition systems with computation
Random polynomial-time attacks and Dolev-Yao models
"... Keywords: Cryptographic protocols, random polynomial time, Dolev-Yao model, Markov de-cision processes. 1 Introduction Proving the security of cryptographic protocols has been a major concern ever since flaws werefirst discovered in some established protocols, the most well-known example being [20]. ..."
Abstract
- Add to MetaCart
Keywords: Cryptographic protocols, random polynomial time, Dolev-Yao model, Markov de-cision processes. 1 Introduction Proving the security of cryptographic protocols has been a major concern ever since flaws werefirst discovered in some established protocols, the most well-known example being [20
Dolev-Yao is no better than Machiavelli
- First Workshop on Issues in the Theory of Security — WITS’00
, 2000
"... We show that all attacks that can be mounted by a traditional Dolev-Yao intruder against common cryptographic protocols can be enacted by an apparently weaker `Machiavellian' adversary in which compromised principals will not share long-term secrets and will not send arbitrary messages. We also ..."
Abstract
-
Cited by 16 (2 self)
- Add to MetaCart
We show that all attacks that can be mounted by a traditional Dolev-Yao intruder against common cryptographic protocols can be enacted by an apparently weaker `Machiavellian' adversary in which compromised principals will not share long-term secrets and will not send arbitrary messages. We
Extending the Dolev-Yao Intruder for Analyzing
"... 1 1 LORIA-INRIA-Universit'es Henri Poincar'e, Nancy 2 ..."
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
- In Proc. of the 11th European Symposium on Research in Computer Security
, 2006
"... Automated tools such as model checkers and theorem provers for the analysis of security protocols typically abstract from cryptography by Dolev-Yao models, i.e., abstract term algebras replace the real cryptographic operations. Recently it was shown that in essence this approach is cryptographica ..."
Abstract
-
Cited by 13 (3 self)
- Add to MetaCart
Automated tools such as model checkers and theorem provers for the analysis of security protocols typically abstract from cryptography by Dolev-Yao models, i.e., abstract term algebras replace the real cryptographic operations. Recently it was shown that in essence this approach
A Computational Interpretation of Dolev-Yao Adversaries
- in Proc. of 3rd Int. Workshop on Issues in the Theory of Security (WITS’03
, 2003
"... The Dolev{Yao model is a simple and useful framework in which to analyze security protocols, but it assumes an extremely limited adversary. It is unclear if the results of this model would remain valid were the adversary to be given additional power. In this work, we show that there exist situat ..."
Abstract
-
Cited by 17 (1 self)
- Add to MetaCart
The Dolev{Yao model is a simple and useful framework in which to analyze security protocols, but it assumes an extremely limited adversary. It is unclear if the results of this model would remain valid were the adversary to be given additional power. In this work, we show that there exist
Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels
"... Abstract. Defining security objectives for industrial control scenarios is a chal-lenging task due to the subtle interactions between system components and be-cause security goals are often far from obvious. Moreover, there is a persistent gap between formal models for channels and adversaries (usua ..."
Abstract
- Add to MetaCart
(usually, transition sys-tems) and models for control systems (differential or recurrent equations). To bind these two realms, we translate control systems into transition systems by means of an abstraction with variable time granularity and compose them with a channel model that is controlled by Dolev-Yao
Deciding Recognizability under Dolev-Yao Intruder Model
"... Abstract. The importance of reasoning about recognizability has re-cently been stressed in finding type flaw attacks, in which a protocol message may be forged from another message. However, the problem of deciding recognizability has never been fully exploited. To fill this gap, we present a termin ..."
Abstract
-
Cited by 4 (3 self)
- Add to MetaCart
terminating procedure to decide recognizability under the stan-dard Dolev-Yao model. By incorporating the proposed procedure with Athena, a well-know security protocol verifier, our experiments succeed in finding potential type flaw attacks.
Complexity of Fairness Constraints for the Dolev-Yao Attacker Model
"... Liveness properties do, in general, not hold in the Dolev-Yao attacker model, unless we assume that certain communica-tion channels are resilient, i.e. they do not lose messages. The resilient channels assumption can be seen as a fairness constraint for the Dolev-Yao attacker model. Here we study th ..."
Abstract
- Add to MetaCart
Liveness properties do, in general, not hold in the Dolev-Yao attacker model, unless we assume that certain communica-tion channels are resilient, i.e. they do not lose messages. The resilient channels assumption can be seen as a fairness constraint for the Dolev-Yao attacker model. Here we study
Flow Logic for Dolev-Yao Secrecy in Cryptographic Processes
, 2002
"... We introduce the SPI-calculus that strengthens the notion of "perfect symmetric cryptography" of the spi-calculus by making encryption history dependent. We give our calculus an operational and a static semantics. The latter is a control ow analysis (CFA), defined in the form of a ow logic ..."
Abstract
-
Cited by 14 (4 self)
- Add to MetaCart
logic, and it is proved semantically correct. We then apply our CFA to check security properties; in particular, we show that secrecy à la Dolev-Yao can be expressed in terms of the CFA.
Results 1 - 10
of
3,542,855