2008
DOI: 10.1109/ipdps.2008.4536556
|View full text |Cite
|
Sign up to set email alerts
|

What is the best way to prove a cryptographic protocol correct?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2010
2010

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…A type-flaw attack is possible on this protocol even in the presence of component numbering (originally presented in [33]): i is the identity of the intruder or attacker; i(x) denotes i spoofing as x. We use lowercase now for agent identities and nonces (a, b, n a , n b ), since this is a trace of the protocol execution, not the protocol specification.…”
Section: Tagging Prevents Type-flaw Attacks Under Xor: Examplementioning
confidence: 99%
See 1 more Smart Citation
“…A type-flaw attack is possible on this protocol even in the presence of component numbering (originally presented in [33]): i is the identity of the intruder or attacker; i(x) denotes i spoofing as x. We use lowercase now for agent identities and nonces (a, b, n a , n b ), since this is a trace of the protocol execution, not the protocol specification.…”
Section: Tagging Prevents Type-flaw Attacks Under Xor: Examplementioning
confidence: 99%
“…If m 1 ∈ Constants(S 1 ), again from BSCA, t 1 cannot belong to Vars, and it must be a constant. If m 1 is a fresh constant of S 1 , then t 1 must also belong to S 1 from Assumption 6 (freshness) and (33), and if m 1 is not fresh, t 1 could belong to either SubTerms(S 1 ) or IIK from Assumption 5. Further, θ = {}.…”
Section: µ-Nut Prevents Multi-protocol Attacksmentioning
confidence: 99%
“…(A and B are agent variables; N A , N B are nonce variables; [X] → Y represents X encrypted with Y using an asymmetric encryption algorithm.). A type-flaw attack is possible on this protocol even in the presence of component numbering (recently presented in [10]):…”
Section: Tagging Prevents Type-flaw Attacks Under Xor -Examplementioning
confidence: 99%