Assumptions: The Trojan Horses of secure protocols

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secure protocols rely on a number of assumptions about the environment which, once made, free the designer from thinking about the complexity of what surrounds the execution context. Henceforth, the designer forgets about the environment and moves on proving her algorithm correct, given the assumptions. When assumptions do not represent with sufficient accuracy the environment they are supposed to depict, they may become the door to successful attacks on an otherwise mathematically correct algorithm. Moreover, this can happen as unwitting to systems as a Trojan Horse's action. We wish to discuss the theoretical underpinnings of those problems and evaluate some recent research results that demonstrate a few of those limitations in actual secure protocols. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Verissimo, P. (2007). Assumptions: The Trojan Horses of secure protocols. In Communications in Computer and Information Science (Vol. 1, pp. 34–41). https://doi.org/10.1007/978-3-540-73986-9_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free