A computational justification for guessing attack formalisms

<p>Recently attempts have been made to extend the Dolev-Yao security model by allowing an intruder to learn weak secrets, such as poorly-chosen passwords, by off-line guessing. In such an attack, the intruder is able to verify a guessed value g if he can use it to produce a value called a veri...

全面介绍

书目详细资料
Main Authors: Newcomb, T, Lowe, G
格式: Report
出版: Oxford University Computing Laboratory 2005