Model checking cryptographic protocols subject to combinatorial attack.

We introduce an approach to model checking cryptographic protocols that use hashing too weak to resist combinatorial attacks. Typically such hashing is used when an extremely low bandwidth channel, such as a human user, is employed to transmit its output. This leads to two opportunities for attack:...

Full description

Bibliographic Details
Main Authors: Roscoe, T, Nguyen., L
Format: Journal article
Published: 2011
_version_ 1826272481406615552
author Roscoe, T
Nguyen., L
author_facet Roscoe, T
Nguyen., L
author_sort Roscoe, T
collection OXFORD
description We introduce an approach to model checking cryptographic protocols that use hashing too weak to resist combinatorial attacks. Typically such hashing is used when an extremely low bandwidth channel, such as a human user, is employed to transmit its output. This leads to two opportunities for attack: deducing a weak value from its properties and discovering alternative ways to produce a given weak value. The first of these proves a natural extension to established protocol modelling approaches, but for the second we require something more novel. We propose an approach based on taking snapshots of the intruder memory.
first_indexed 2024-03-06T22:13:14Z
format Journal article
id oxford-uuid:52875969-f7ae-4575-a2be-558dbe46277a
institution University of Oxford
last_indexed 2024-03-06T22:13:14Z
publishDate 2011
record_format dspace
spelling oxford-uuid:52875969-f7ae-4575-a2be-558dbe46277a2022-03-26T16:26:03ZModel checking cryptographic protocols subject to combinatorial attack.Journal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:52875969-f7ae-4575-a2be-558dbe46277aDepartment of Computer Science2011Roscoe, TNguyen., LWe introduce an approach to model checking cryptographic protocols that use hashing too weak to resist combinatorial attacks. Typically such hashing is used when an extremely low bandwidth channel, such as a human user, is employed to transmit its output. This leads to two opportunities for attack: deducing a weak value from its properties and discovering alternative ways to produce a given weak value. The first of these proves a natural extension to established protocol modelling approaches, but for the second we require something more novel. We propose an approach based on taking snapshots of the intruder memory.
spellingShingle Roscoe, T
Nguyen., L
Model checking cryptographic protocols subject to combinatorial attack.
title Model checking cryptographic protocols subject to combinatorial attack.
title_full Model checking cryptographic protocols subject to combinatorial attack.
title_fullStr Model checking cryptographic protocols subject to combinatorial attack.
title_full_unstemmed Model checking cryptographic protocols subject to combinatorial attack.
title_short Model checking cryptographic protocols subject to combinatorial attack.
title_sort model checking cryptographic protocols subject to combinatorial attack
work_keys_str_mv AT roscoet modelcheckingcryptographicprotocolssubjecttocombinatorialattack
AT nguyenl modelcheckingcryptographicprotocolssubjecttocombinatorialattack