AbstractIn this paper we report on an analysis for finding known-pair and chosen-text attacks in protocols. As these attacks are at the level of blocks, we extend the attacker by special capabilities related to block chaining techniques. The analysis is automated using Blanchet's protocol verifier and illustrated on two well-known protocols, the Needham-Schroeder-Lowe public-key protocol as well as the Needham-Schroeder symmetric-key protocol. On the first protocol, we show how the special intruder capabilities related to chaining may compromise the secrecy of nonces and that chosen- ciphertext attacks are possible. We propose two modified versions of the protocol which strengthen its security. We then illustrate known-pair and chosen-plain...
A guessing attack on a security protocol is an attack where an attacker guesses a poorly chosen secr...
Password-Authenticated Key Exchange (PAKE) protocols enable two or more parties to use human-memorab...
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an i...
AbstractIn this paper we report on an analysis for finding known-pair and chosen-text attacks in pro...
. There are many cases in the literature in which reuse of the same key material for different funct...
We provide the first computational analysis of the well known Needham-Schröeder(-Lowe) protocol. We ...
In this chapter, we show how security protocols can be attacked by exploiting the underlying block c...
We study the security of password protocols against off-line dictionary attacks. In addition to the ...
The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet....
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an i...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...
In this paper, we develop an analysis of the Needham-Schroeder Public-Key Protocol in the framework ...
AbstractThis paper reports on work in progress on using rewriting techniques for the specification a...
We present a symbolic framework, based on a modular operational semantics, for formalizing different...
Formal methods have been successfully applied to exceedingly abstract system specifications to verif...
A guessing attack on a security protocol is an attack where an attacker guesses a poorly chosen secr...
Password-Authenticated Key Exchange (PAKE) protocols enable two or more parties to use human-memorab...
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an i...
AbstractIn this paper we report on an analysis for finding known-pair and chosen-text attacks in pro...
. There are many cases in the literature in which reuse of the same key material for different funct...
We provide the first computational analysis of the well known Needham-Schröeder(-Lowe) protocol. We ...
In this chapter, we show how security protocols can be attacked by exploiting the underlying block c...
We study the security of password protocols against off-line dictionary attacks. In addition to the ...
The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet....
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an i...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...
In this paper, we develop an analysis of the Needham-Schroeder Public-Key Protocol in the framework ...
AbstractThis paper reports on work in progress on using rewriting techniques for the specification a...
We present a symbolic framework, based on a modular operational semantics, for formalizing different...
Formal methods have been successfully applied to exceedingly abstract system specifications to verif...
A guessing attack on a security protocol is an attack where an attacker guesses a poorly chosen secr...
Password-Authenticated Key Exchange (PAKE) protocols enable two or more parties to use human-memorab...
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an i...