Key-updating protocols are a class of communication protocol that aim to increase security by having the participants change encryption keys between protocol executions. However, such protocols can be vulnerable to desynchronisation attacks, a denial of service attack in which the agents are tricked into updating their keys improperly, impeding future communication. In this work we introduce a method that can be used to automatically verify (or falsify) resistance to desynchronisation attacks for a range of protocols. This approach is then used to identify previously unreported vulnerabilities in two published RFID grouping protocols.
CITATION STYLE
Mauw, S., Smith, Z., Toro-Pozo, J., & Trujillo-Rasua, R. (2018). Automated identification of desynchronisation attacks on shared secrets. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11098 LNCS, pp. 406–426). Springer Verlag. https://doi.org/10.1007/978-3-319-99073-6_20
Mendeley helps you to discover research relevant for your work.