Computer Science – Cryptography and Security
Scientific paper
2005-03-17
Computer Science
Cryptography and Security
Scientific paper
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the well known Clark Jacob library and the Security Protocol Open Repository (SPORE) library. Finally, we present some new challenges and threats that arise when considering time in the analysis, by providing a novel protocol that uses time challenges and exposing a timing attack over an implementation of an existing security protocol.
Corin Ricardo
Etalle Sandro
Hartel P. H.
Mader A.
No associations
LandOfFree
Timed Analysis of Security Protocols does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Timed Analysis of Security Protocols, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Timed Analysis of Security Protocols will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-605978