A computational justification for guessing attack formalisms
<p>Recently attempts have been made to extend the Dolev-Yao security model by allowing an intruder to learn weak secrets, such as poorly-chosen passwords, by off-line guessing. In such an attack, the intruder is able to verify a guessed value g if he can use it to produce a value called a veri...
Main Authors: | Newcomb, T, Lowe, G |
---|---|
Format: | Report |
Udgivet: |
Oxford University Computing Laboratory
2005
|
Lignende værker
-
A Computational Justification for Guessing Attack Formalisms
af: Newcomb, T, et al.
Udgivet: (2006) -
Analysing Protocol Subject to Guessing Attacks
af: Lowe, G
Udgivet: (2004) -
The science of guessing in collision-optimized divide-and-conquer attacks
af: Ou, Changhai, et al.
Udgivet: (2022) -
Improved guess-and-determine and distinguishing attacks on SNOW-V
af: Jing Yang, et al.
Udgivet: (2021-09-01) -
Optimal guessing in 'Guess Who'.
af: Ben O'Neill
Udgivet: (2021-01-01)