Proceedings of 9th Annual Computer Security Applications Conference
DOI: 10.1109/csac.1993.315453
|View full text |Cite
|
Sign up to set email alerts
|

Using logics to detect implementation-dependent flaws [cryptographic protocol design]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…This lead to the discovery of an implementation-dependent flaw similar to the one found in [12] and [2], as well as of an attack that pointed out a place where our requirements might be too stringent. As in the earlier case, the discovery of an implementation-dependent flaw does not mean that implementations of the protocol are necessarily or even likely to be flawed, but rather that there is a hidden assumption in the specification whose violation would cause a security flaw.…”
Section: Analysis Of a Modified Version Of The Ns Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…This lead to the discovery of an implementation-dependent flaw similar to the one found in [12] and [2], as well as of an attack that pointed out a place where our requirements might be too stringent. As in the earlier case, the discovery of an implementation-dependent flaw does not mean that implementations of the protocol are necessarily or even likely to be flawed, but rather that there is a hidden assumption in the specification whose violation would cause a security flaw.…”
Section: Analysis Of a Modified Version Of The Ns Protocolmentioning
confidence: 99%
“…As in the earlier case, the discovery of an implementation-dependent flaw does not mean that implementations of the protocol are necessarily or even likely to be flawed, but rather that there is a hidden assumption in the specification whose violation would cause a security flaw. In this case, as in the flaw discovered in [12] and [2], the hidden assumption is that the principals have the ability to recognize different types of data, such as keys, nonces, and timestamps. In [12] and [2] an attack was found on the Neuman-Stubblebine protocol which depends upon the receiver's inability to distinguish a nonce from a key.…”
Section: Analysis Of a Modified Version Of The Ns Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…These are known as run internal attacks. An example involving the Neuman-Stubblebine repeated authentication protocol [NS93,CJ97] has been exposed by Syverson in [Syv93b] and by Carlsen in [Car93].…”
Section: A Taxonomy Of Replaysmentioning
confidence: 99%
“…In previous work, verification of protocols susceptible to type flaw attacks has been attempted using various formalisms [12,10,8,7,25,11,24]. The attacks considered generally involve simple 'type confusion' attacks in which segments of one type are confused with segments of another type, or in the more advanced models, in which a segment of one type is confused with the concatenation of two or more other segments of varying types [18].…”
Section: Introductionmentioning
confidence: 99%