Recently, a new verification tool for cryptographic protocols called S3A (Spi Calculus Specifications Symbolic Analyzer) has been developed, which is based on exhaustive state space exploration and symbolic data representation, and overcomes most of the limitations of previously available tools. In this paper we present some insights on the ability of S3A to detect complex type flaw attacks, using a weakened version of the well-known Yahalom authentication protocol as a case study. The nature of the attack found by S3A makes it very difficult to spot by hand, thus showing the usefulness of analyis tools of this kind in real-world protocol analysis.
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study / CIBRARIO BERTOLOTTI, I.; Durante, L.; Sisto, Riccardo; Valenzano, A.. - STAMPA. - 3548:(2005), pp. 69-84. (Intervento presentato al convegno Second International Conference, DIMVA 2005 tenutosi a Vienna (AT) nel July 7-8, 2005) [10.1007/11506881_5].
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study
CIBRARIO BERTOLOTTI I.;DURANTE L.;SISTO, Riccardo;VALENZANO A.
2005
Abstract
Recently, a new verification tool for cryptographic protocols called S3A (Spi Calculus Specifications Symbolic Analyzer) has been developed, which is based on exhaustive state space exploration and symbolic data representation, and overcomes most of the limitations of previously available tools. In this paper we present some insights on the ability of S3A to detect complex type flaw attacks, using a weakened version of the well-known Yahalom authentication protocol as a case study. The nature of the attack found by S3A makes it very difficult to spot by hand, thus showing the usefulness of analyis tools of this kind in real-world protocol analysis.File | Dimensione | Formato | |
---|---|---|---|
document.pdf
non disponibili
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
249.07 kB
Formato
Adobe PDF
|
249.07 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/1418144