2019
DOI: 10.3934/amc.2019034
|View full text |Cite
|
Sign up to set email alerts
|

Critical perspectives on provable security: Fifteen years of "another look" papers

Abstract: We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half. We also provide numerous additional examples and a few updates and errata.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 152 publications
(250 reference statements)
0
2
0
Order By: Relevance
“…The Needham-Schroeder protocol, formalized in 1989 [64], was shown to be broken seven years later using an automated tool [65]. In the years since, many attacks have been discovered against formally proven protocol schemes [66], [67]. Koblitz and Menezes [67] list multiple reasons why proofs can go wrong, some of which, such as implicit and incorrect assumptions, also appeared in our case study.…”
Section: Related Workmentioning
confidence: 76%
See 1 more Smart Citation
“…The Needham-Schroeder protocol, formalized in 1989 [64], was shown to be broken seven years later using an automated tool [65]. In the years since, many attacks have been discovered against formally proven protocol schemes [66], [67]. Koblitz and Menezes [67] list multiple reasons why proofs can go wrong, some of which, such as implicit and incorrect assumptions, also appeared in our case study.…”
Section: Related Workmentioning
confidence: 76%
“…In the years since, many attacks have been discovered against formally proven protocol schemes [66], [67]. Koblitz and Menezes [67] list multiple reasons why proofs can go wrong, some of which, such as implicit and incorrect assumptions, also appeared in our case study. Other papers, like the KRACK attacks [68] show how protocol implementations deviating from the formal descriptions can enable attacks, while pen-and-paper security proofs have been described as "alarmingly fragile" [69].…”
Section: Related Workmentioning
confidence: 92%