Modeling Adversaries in a Logic for Security Protocol Analysis

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

23 pages. A preliminary version appeared in the proceedings of FaSec'02

Scientific paper

10.2168/LMCS-8(1:22)2012

Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and decipher them with known keys. The Dolev-Yao model is a useful abstraction, but it suffers from some drawbacks: it cannot handle the adversary knowing protocol-specific information, and it cannot handle probabilistic notions, such as the adversary attempting to guess the keys. We show how we can analyze security protocols under different adversary models by using a logic with a notion of algorithmic knowledge. Roughly speaking, adversaries are assumed to use algorithms to compute their knowledge; adversary capabilities are captured by suitable restrictions on the algorithms used. We show how we can model the standard Dolev-Yao adversary in this setting, and how we can capture more general capabilities including protocol-specific knowledge and guesses.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Modeling Adversaries in a Logic for Security Protocol Analysis does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Modeling Adversaries in a Logic for Security Protocol Analysis, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Modeling Adversaries in a Logic for Security Protocol Analysis will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-33241

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.