Title :
Cryptographic protocol flaws: know your enemy
Author_Institution :
Ecole Nat. Superieure des Telecommun. de Bretagne, Cesson Sevigne, France
Abstract :
Flaws are introduced at every stage of the protocol development cycle. The engineer is faced with the problem of how to avoid them. The first step is to gain an understanding of the different flavours of cryptographic protocol flaws, i.e. get to know the enemy. This paper provides a classification of protocol flaws, including two new flaws in an application of the mental poker protocol, and discusses appropriate countermeasures for relevant flaw-categories
Keywords :
cryptography; protocols; cryptographic protocol flaws; mental poker protocol; Application software; Cryptographic protocols; Cryptography; Formal specifications; Graphics; Plasma welding; Specification languages;
Conference_Titel :
Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-6230-1
DOI :
10.1109/CSFW.1994.315934