Automatic detection of attacks on cryptographic protocols: A case study

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, a new verification tool for cryptographic protocols called S 3 A (Spi Calculus Specifications Symbolic Analyzer) has been developed, which is based on exhaustive state space exploration and symbolic data representation, and overcomes most of the limitations of previously available tools. In this paper we present some insights on the ability of S 3 A to detect complex type flaw attacks, using a weakened version of the well-known Yahalom authentication protocol as a case study. The nature of the attack found by S 3 A makes it very difficult to spot by hand, thus showing the usefulness of analyis tools of this kind in real-world protocol analysis. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Ivan Cibrario, B., Durante, L., Sisto, R., & Valenzano, A. (2005). Automatic detection of attacks on cryptographic protocols: A case study. In Lecture Notes in Computer Science (Vol. 3548, pp. 69–84). Springer Verlag. https://doi.org/10.1007/11506881_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free