Proceedings the Computer Security Foundations Workshop VII
DOI: 10.1109/csfw.1994.315934
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic protocol flaws: know your enemy

Abstract: Flaws are introduced at eve y stage of the protocol development cycle. The engineer is faced with the problem of how t o avoid them. The first step is to gain an understanding of the diflerent flavours of cryptographic protocol flaws, ie. get to know the enemy. This paper provides a classification of protocol flaws, including two new paws in an application of the mental poker protocol, and discusses appropriate countermeasures f o r relevant paw-categories.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(27 citation statements)
references
References 31 publications
0
23
0
Order By: Relevance
“…Attacks that might exist if there are terms that may be "read" as having more than one form are referred to as type flaw attacks [4]. Some type flaw attacks seem implausible, in the sense that most implementations would not be vulnerable to them, while others are more troublesome.…”
Section: Terms and Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Attacks that might exist if there are terms that may be "read" as having more than one form are referred to as type flaw attacks [4]. Some type flaw attacks seem implausible, in the sense that most implementations would not be vulnerable to them, while others are more troublesome.…”
Section: Terms and Encryptionmentioning
confidence: 99%
“…Copyright 1998 IEEE. Published in Proceedings, 1998 IEEE Symposium on Security and Privacy, [3][4][5][6] May 1998 in Oakland, California. an ideal cryptosystem. In other cases, characteristics of the cryptosystem and characteristics of the protocol combine to cause protocol failure [16,5,18].…”
Section: Introductionmentioning
confidence: 99%
“…Figure 3 shows the open-ended base of attack actions that in the current implementation of the MI intruder model are checked for their feasibility. The selected attack actions appear as primitive steps in attacks reported in the related bibliography and have been proposed in published taxonomies [17,18,19] that formalize the observations of intruder misbehaviors, where the intruder redirects messages among protocol participants. In [15], we provided formal definitions of the selected primitive attack actions, as well as bibliographic examples, where these attack actions violate security properties of existing protocols.…”
Section: The MI Intruder Model In Usementioning
confidence: 99%
“…or suggesting one should use different encryption systems or add hashings to each message, e.g. [6,3]. Protocol designers are often unwilling to follow these guidelines.…”
Section: Introductionmentioning
confidence: 99%