Protocol interactions and the chosen protocol attack

63Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions between protocols, and present a new attack, called the chosen protocol attack, in which an attacker may write a new protocol using the same key material as a target protocol, which is individually very strong, but which interacts with the target protocol in a security-relevant way. We finish with a brief discussion of design principles to resist this class of attack.

Cite

CITATION STYLE

APA

Kelsey, J., Schneier, B., & Wagner, D. (1998). Protocol interactions and the chosen protocol attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1361, pp. 91–104). Springer Verlag. https://doi.org/10.1007/bfb0028162

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free