15th International Conference on Advanced Computing and Communications (ADCOM 2007) 2007
DOI: 10.1109/adcom.2007.112
|View full text |Cite
|
Sign up to set email alerts
|

Some New Multi-Protocol Attacks

Abstract: Security protocols are often designed and analyzed in isolation. In the real world, however, more than one protocol may be executed concurrently, possibly with the same keying material. An intruder may therefore be able to manipulate messages from different protocols in order to break the security of an otherwise secure protocol. Attacks involving interactions between different protocols, also referred to as multi-protocol attacks, have appeared less frequently in the literature than attacks involving single p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
9
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(10 citation statements)
references
References 25 publications
1
9
0
Order By: Relevance
“…weaker agreement: if B thinks that a nonce N A is generated by A, then A has generated N A and B authenticates A (called Aut A in Figure 3 and 4) Figure 3 summarizes results that we obtain with Tamarin in isolation on protocols from [22], and Figure 4 summarizes results we obtain for the multiprotocols. As previously, ni-synch stands for non-injective synchronization, sec stands for secrecy and ni-agree stands for non-injective agreement.…”
Section: Attacks By Mathuria Et Al [22]mentioning
confidence: 92%
See 4 more Smart Citations
“…weaker agreement: if B thinks that a nonce N A is generated by A, then A has generated N A and B authenticates A (called Aut A in Figure 3 and 4) Figure 3 summarizes results that we obtain with Tamarin in isolation on protocols from [22], and Figure 4 summarizes results we obtain for the multiprotocols. As previously, ni-synch stands for non-injective synchronization, sec stands for secrecy and ni-agree stands for non-injective agreement.…”
Section: Attacks By Mathuria Et Al [22]mentioning
confidence: 92%
“…We try to find the attacks described in [22] using Tamarin, to see if we find the same or different attacks if we use an automatic tool. The properties verified are not clearly defined in [22], so we keep the properties as defined previously. More precisely, we verified different authentication properties: non-injective synchronization, non-injective agreement, and a weaker agreement property.…”
Section: Attacks By Mathuria Et Al [22]mentioning
confidence: 99%
See 3 more Smart Citations