A computational justification for guessing attack formalisms
<p>Recently attempts have been made to extend the Dolev-Yao security model by allowing an intruder to learn weak secrets, such as poorly-chosen passwords, by off-line guessing. In such an attack, the intruder is able to verify a guessed value g if he can use it to produce a value called a veri...
Autors principals: | Newcomb, T, Lowe, G |
---|---|
Format: | Report |
Publicat: |
Oxford University Computing Laboratory
2005
|
Ítems similars
-
A Computational Justification for Guessing Attack Formalisms
per: Newcomb, T, et al.
Publicat: (2006) -
Analysing Protocol Subject to Guessing Attacks
per: Lowe, G
Publicat: (2004) -
The science of guessing in collision-optimized divide-and-conquer attacks
per: Ou, Changhai, et al.
Publicat: (2022) -
Improved guess-and-determine and distinguishing attacks on SNOW-V
per: Jing Yang, et al.
Publicat: (2021-09-01) -
Optimal guessing in 'Guess Who'.
per: Ben O'Neill
Publicat: (2021-01-01)