Model checking cryptographic protocols subject to combinatorial attack.

We introduce an approach to model checking cryptographic protocols that use hashing too weak to resist combinatorial attacks. Typically such hashing is used when an extremely low bandwidth channel, such as a human user, is employed to transmit its output. This leads to two opportunities for attack:...

Full description

Bibliographic Details
Main Authors: Roscoe, T, Nguyen., L
Format: Journal article
Published: 2011