Timed Analysis of Security Protocols

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the well known Clark Jacob library and the Security Protocol Open Repository (SPORE) library. Finally, we present some new challenges and threats that arise when considering time in the analysis, by providing a novel protocol that uses time challenges and exposing a timing attack over an implementation of an existing security protocol.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Timed Analysis of Security Protocols does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Timed Analysis of Security Protocols, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Timed Analysis of Security Protocols will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-605978

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.