International audienceWe consider the problem of formal automatic verification of cryptographic protocols when some data, like poorly chosen passwords, can be guessed by dictionary attacks. First, we define a theory of these attacks and propose an inference system modeling the deduction capabilities of an intruder. This system extends a set of well-studied deduction rules for symmetric and public key encryption, often called Dolev–Yao rules, with the introduction of a probabilistic encryption operator and guessing abilities for the intruder. Then, we show that the intruder deduction problem in this extended model is decidable in PTIME. The proof is based on a locality lemma for our inference system. This first result yields to an NP decisio...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
We study the security of password protocols against off-line dictionary attacks. In addition to the ...
International audienceMany decision problems on security protocols can be reduced to solving deducti...
International audienceWe consider the problem of automating proofs of cryptographic protocols when s...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
Guessing, or dictionary, attacks arise when an intruder exploits the fact that certain data like pas...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
International audienceWe present a non-deterministic polynomial time procedure to decide the problem...
AbstractWe consider secrecy and authentication in a simple process calculus with cryptographic primi...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...
AbstractCryptographic protocols are small programs which involve a high level of concurrency and whi...
AbstractMany cryptographic protocols and attacks on these protocols make use of the fact that the or...
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standa...
Abstract. We introduce a probabilistic framework for the automated analysis of security protocols. O...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
We study the security of password protocols against off-line dictionary attacks. In addition to the ...
International audienceMany decision problems on security protocols can be reduced to solving deducti...
International audienceWe consider the problem of automating proofs of cryptographic protocols when s...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
Guessing, or dictionary, attacks arise when an intruder exploits the fact that certain data like pas...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
International audienceWe present a non-deterministic polynomial time procedure to decide the problem...
AbstractWe consider secrecy and authentication in a simple process calculus with cryptographic primi...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...
AbstractCryptographic protocols are small programs which involve a high level of concurrency and whi...
AbstractMany cryptographic protocols and attacks on these protocols make use of the fact that the or...
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standa...
Abstract. We introduce a probabilistic framework for the automated analysis of security protocols. O...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
We study the security of password protocols against off-line dictionary attacks. In addition to the ...
International audienceMany decision problems on security protocols can be reduced to solving deducti...