• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,542,855
Next 10 →

Random polynomial-time attacks and Dolev-Yao models

by Mathieu Baudet - JOURNAL OF AUTOMATA, LANGUAGES AND COMBINATORICS , 2005
"... In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao models can be seen as transition systems, possibly infinite. We then extend these transition systems with computation tim ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao models can be seen as transition systems, possibly infinite. We then extend these transition systems with computation

Random polynomial-time attacks and Dolev-Yao models

by unknown authors
"... Keywords: Cryptographic protocols, random polynomial time, Dolev-Yao model, Markov de-cision processes. 1 Introduction Proving the security of cryptographic protocols has been a major concern ever since flaws werefirst discovered in some established protocols, the most well-known example being [20]. ..."
Abstract - Add to MetaCart
Keywords: Cryptographic protocols, random polynomial time, Dolev-Yao model, Markov de-cision processes. 1 Introduction Proving the security of cryptographic protocols has been a major concern ever since flaws werefirst discovered in some established protocols, the most well-known example being [20

Dolev-Yao is no better than Machiavelli

by Paul Syverson, Catherine Meadows, Iliano Cervesato - First Workshop on Issues in the Theory of Security — WITS’00 , 2000
"... We show that all attacks that can be mounted by a traditional Dolev-Yao intruder against common cryptographic protocols can be enacted by an apparently weaker `Machiavellian' adversary in which compromised principals will not share long-term secrets and will not send arbitrary messages. We also ..."
Abstract - Cited by 16 (2 self) - Add to MetaCart
We show that all attacks that can be mounted by a traditional Dolev-Yao intruder against common cryptographic protocols can be enacted by an apparently weaker `Machiavellian' adversary in which compromised principals will not share long-term secrets and will not send arbitrary messages. We

Extending the Dolev-Yao Intruder for Analyzing

by Yannick Chevalier, Laurent Vigneron
"... 1 1 LORIA-INRIA-Universit'es Henri Poincar'e, Nancy 2 ..."
Abstract - Add to MetaCart
1 1 LORIA-INRIA-Universit'es Henri Poincar'e, Nancy 2

Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes

by Michael Backes, Birgit Pfitzmann, Michael Waidner - In Proc. of the 11th European Symposium on Research in Computer Security , 2006
"... Automated tools such as model checkers and theorem provers for the analysis of security protocols typically abstract from cryptography by Dolev-Yao models, i.e., abstract term algebras replace the real cryptographic operations. Recently it was shown that in essence this approach is cryptographica ..."
Abstract - Cited by 13 (3 self) - Add to MetaCart
Automated tools such as model checkers and theorem provers for the analysis of security protocols typically abstract from cryptography by Dolev-Yao models, i.e., abstract term algebras replace the real cryptographic operations. Recently it was shown that in essence this approach

A Computational Interpretation of Dolev-Yao Adversaries

by Jonathan Herzog - in Proc. of 3rd Int. Workshop on Issues in the Theory of Security (WITS’03 , 2003
"... The Dolev{Yao model is a simple and useful framework in which to analyze security protocols, but it assumes an extremely limited adversary. It is unclear if the results of this model would remain valid were the adversary to be given additional power. In this work, we show that there exist situat ..."
Abstract - Cited by 17 (1 self) - Add to MetaCart
The Dolev{Yao model is a simple and useful framework in which to analyze security protocols, but it assumes an extremely limited adversary. It is unclear if the results of this model would remain valid were the adversary to be given additional power. In this work, we show that there exist

Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels

by Bogdan Groza, Marius Minea
"... Abstract. Defining security objectives for industrial control scenarios is a chal-lenging task due to the subtle interactions between system components and be-cause security goals are often far from obvious. Moreover, there is a persistent gap between formal models for channels and adversaries (usua ..."
Abstract - Add to MetaCart
(usually, transition sys-tems) and models for control systems (differential or recurrent equations). To bind these two realms, we translate control systems into transition systems by means of an abstraction with variable time granularity and compose them with a channel model that is controlled by Dolev-Yao

Deciding Recognizability under Dolev-Yao Intruder Model

by Zhiwei Li, Weichao Wang
"... Abstract. The importance of reasoning about recognizability has re-cently been stressed in finding type flaw attacks, in which a protocol message may be forged from another message. However, the problem of deciding recognizability has never been fully exploited. To fill this gap, we present a termin ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
terminating procedure to decide recognizability under the stan-dard Dolev-Yao model. By incorporating the proposed procedure with Athena, a well-know security protocol verifier, our experiments succeed in finding potential type flaw attacks.

Complexity of Fairness Constraints for the Dolev-Yao Attacker Model

by Mohammad Torabi Dashti
"... Liveness properties do, in general, not hold in the Dolev-Yao attacker model, unless we assume that certain communica-tion channels are resilient, i.e. they do not lose messages. The resilient channels assumption can be seen as a fairness constraint for the Dolev-Yao attacker model. Here we study th ..."
Abstract - Add to MetaCart
Liveness properties do, in general, not hold in the Dolev-Yao attacker model, unless we assume that certain communica-tion channels are resilient, i.e. they do not lose messages. The resilient channels assumption can be seen as a fairness constraint for the Dolev-Yao attacker model. Here we study

Flow Logic for Dolev-Yao Secrecy in Cryptographic Processes

by C. Bodei, P. Degano, F. Nielson, H. Riis Nielson , 2002
"... We introduce the SPI-calculus that strengthens the notion of "perfect symmetric cryptography" of the spi-calculus by making encryption history dependent. We give our calculus an operational and a static semantics. The latter is a control ow analysis (CFA), defined in the form of a ow logic ..."
Abstract - Cited by 14 (4 self) - Add to MetaCart
logic, and it is proved semantically correct. We then apply our CFA to check security properties; in particular, we show that secrecy à la Dolev-Yao can be expressed in terms of the CFA.
Next 10 →
Results 1 - 10 of 3,542,855
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2018 The Pennsylvania State University