The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Filters
How to prevent type-flaw and multi-protocol attacks on cryptographic protocols under Exclusive-OR
[article]
2010
arXiv
pre-print
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. ...
This is the problem we consider in this paper: We prove that, under certain assumptions, tagging encrypted components still prevents type-flaw and multi-protocol attacks even in the presence of the XOR ...
Type-flaw attacks. Type-flaw attacks on password protocols were studied by Malladi et al. in [31] . ...
arXiv:1004.2522v3
fatcat:55m6moaycvb7fcwmtrvmrkrtha
Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools
[chapter]
1997
Safe Comp 97
When designing and implementing cryptographic protocols one must avoid a number of possible flaws. ...
flaws, internal protocol flaws, and cryptosystem flaws. ...
In cryptographic protocols part of at least one message is encrypted. When developing a cryptographic protocol it is desirable to uncover any flaws as soon as possible. ...
doi:10.1007/978-1-4471-0997-6_10
dblp:conf/safecomp/GritzalisS97
fatcat:go4hkyeygrczjg63vlgyaopnde
Dagstuhl Seminar 01391: Specification and Analysis of Secure Cryptographic Protocols Title: A flaw in a denial-of-service resistant protocol
unpublished
Designing cryptographic protocols is difficult. Cryptographic protocols are vulnerable to message modification attacks and it is surprisingly difficult to get even small protocols right. ...
Moreover, they provide a basis for using tools such as model checkers and theorem-provers to prove protocols correct or uncover security flaws. ...
Designing cryptographic protocols is difficult. Cryptographic protocols are vulnerable to message modification attacks and it is surprisingly difficult to get even small protocols right. ...
fatcat:yev4xnzcavgf7dnvs2dtf36f6u
Automated Proof and Flaw-Finding Tools in Cryptography
2015
IEEE Security and Privacy
Graham Steel is CEO and cofounder of Cryptosense, a spin-off of INRIA that produces software for security analysis of cryptographic systems. Contact him at graham. steel@cryptosense.com. ...
expert peer review, flaws are regularly found in security proofs, APIs, protocols, and protocol implementations. ...
Comparing several implementations of the same protocol has also proved fruitful in finding flaws. ...
doi:10.1109/msp.2015.22
fatcat:thtaumctcjbyzjpb3kkq75y3ku
Cryptography: the importance of not being different
1999
Computer
No single company (outside the military) has the financial resources necessary to evaluate a new cryptographic algorithm or shake the design flaws out of a complex protocol. ...
And a great algorithm, protocol, and implementation can be ruined by a flawed random-number generator. If there is a security flaw in the code, the rest of it doesn't matter. ...
doi:10.1109/2.751335
fatcat:bewrxmcpvbd4rdszjgpwsitsxe
miTLS: Verifying Protocol Implementations against Real-World Attacks
2016
IEEE Security and Privacy
, and protocol flaws. ...
Besides cryptographic weaknesses, the SSL handshake protocol itself was shown to be vulnerable to logical flaws. ...
doi:10.1109/msp.2016.123
fatcat:fisjry37bzexpdcl26l67e67p4
From absence of certain vulnerabilities towards security proofs
2003
Proceedings of the 2003 workshop on New security paradigms - NSPW '03
The Dolev-Yao model has been originally intended and successfully used for detecting flaws in many protocols. ...
The application of formal methods for rigorously validating cryptographic protocols has been getting increasing attention. ...
The wish list is mainly motivated by the cryptographic point of view. One should be able to design flawed protocols that exploit exactly one of the vulnerabilities. ...
doi:10.1145/986655.986666
dblp:conf/nspw/BackesS03
fatcat:mhnlvqa6ozcyfk6wnrwtj447ny
A Simple and Efficient Approach to Verifying Cryptographic Protocols
[chapter]
2000
IFIP Advances in Information and Communication Technology
It is necessary to development the formal tools for verifying cryptographic protocols because of the subtlety of cryptographic protocols flaws; In terms of the notions of restrictive channel and equivalent ...
message, this paper presents a approach that utilizes the substitution rules of messages and deduction rules to prove whether the insecure states of cryptographic protocols are reachable or not, and the ...
In order to avoid cryptographic protocols flaws, it is necessary to design strong cryptographic algorithms and sound protocol structures. ...
doi:10.1007/978-0-387-35515-3_20
fatcat:sjj6jk43v5d2rcs64a6lxjx55e
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
1999
Computer Communications
Modern high-level specification languages and tools can be used for automatically analysing cryptographic protocols. ...
Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems. ...
After the discovery of flaws in a protocol, the flaws are often corrected or approaches adopted to avoid using the reasoning of the flawed protocols [4] . ...
doi:10.1016/s0140-3664(99)00030-4
fatcat:cv3vmaztf5drxc2edllnfgefva
Verification of Security Protocols (Invited Talk)
2020
Annual Conference for Computer Science Logic
Cryptographic protocols aim at securing communications over insecure networks like the Internet. ...
The field has now reached a good level of maturity with efficient techniques for the automatic security analysis of protocols After an overview of some famous protocols and flaws, we will describe the ...
Description of the talk Cryptographic protocols aim at securing communications over insecure networks like the Internet. ...
doi:10.4230/lipics.csl.2020.1
dblp:conf/csl/Cortier20
fatcat:ygkyxmpapnf45mdqpnlo2jp3x4
Cryptography Is Harder than It Looks
2016
IEEE Security and Privacy
He helped build various PGP products, including some cryptographic protocols and software in PGPfone. ...
J OHN KELSEY is an experienced cryptographer, cryptanalyst, and programmer who has designed several algorithms and protocols, and has broken many more. ...
doi:10.1109/msp.2016.7
fatcat:quom7nxbz5dyzpt4mdhhfduxlm
Automated Analysis of Security Protocols
2003
Electronical Notes in Theoretical Computer Science
Cryptographic protocols such as IKE, SET, TLS, Kerberos have been developed to secure electronic transactions. ...
Protocol specifications as they can be found in white papers are compiled by the CASRUL system [8,2] and then are passed on decision procedures for checking whether they are exposed to flaws 1 . ...
Among the 51 protocols 35 are flawed, and CASRUL can find a flaw in 32 of them, including a previously unknown type flaw in Denning Sacco Protocol. ...
doi:10.1016/s1571-0661(04)80690-x
fatcat:7ef4ilufrzbcforkbch4gfgwl4
Verifying Software Vulnerabilities in IoT Cryptographic Protocols
[article]
2020
arXiv
pre-print
We evaluate the application of EBF verification framework on a case study, i.e., the S-MQTT protocol, to check security vulnerabilities in cryptographic protocols for IoT. ...
However, the design and implementation of such protocols is an error-prone task; flaws in the implementation can lead to devastating security vulnerabilities. ...
However, implementing encryption for protocols is an error-prone task [40] ; flaws in the implementation can lead to devastating security vulnerabilities [40] . ...
arXiv:2001.09837v1
fatcat:qjjpkp7775bivnjfgtlkc2e7z4
Cryptographic Protocol Analysis of AN.ON
[chapter]
2010
Lecture Notes in Computer Science
This work presents a cryptographic analysis of AN.ON's anonymization protocols. We have discovered three flaws of differing severity. ...
The flaws we discovered represent errors that, unfortunately, still occur quite often and show the importance of either using standardized crytpographic protocols or performing detailed security analyses ...
Conclusion In this paper we have analysed the cryptographic protocols of AN.ON and discovered three flaws of differing severity. ...
doi:10.1007/978-3-642-14577-3_11
fatcat:cuprfws7ozdldjkqdcxvofkojq
Formal Methods in Information Security
2015
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering. ...
railways, nuclear energy, and secure information systems.This paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols ...
Attacks based on Cryptosystem-Related Flaws exploit protocol flaws that arise from the bad interaction between the protocol logic and specific properties of the chosen cryptographic algorithm. ...
doi:10.24297/ijct.v14i4.1963
fatcat:s7ratzapovh6jgax26zbpsct2e
« Previous
Showing results 1 — 15 out of 9,129 results