Title :
Verifiable-text attacks in cryptographic protocols
Author_Institution :
Comput. Lab., Cambridge Univ., UK
Abstract :
The author introduces a form of attack, a verifiable-test attack, in which an attacker obtains secret information, such as a password used in a protocol, without breaking the underlying cryptosystem. An investigation is made of the essence of a verifiable-text attack, and an algorithm for examining protocols and searching for vulnerabilities to such an attack is developed. Caution has to be exercised in certifying that a protocol is not vulnerable because a healthy protocol may become vulnerable when it interacts with another vulnerable or even healthy protocol
Keywords :
cryptography; protocols; algorithm; cryptographic protocols; password; verifiable-test attack; Authentication; Cryptographic protocols; Cryptography; Dictionaries; Graph theory; Internet; Laboratories; Shape; Space exploration; Trademarks;
Conference_Titel :
INFOCOM '90, Ninth Annual Joint Conference of the IEEE Computer and Communication Societies. The Multiple Facets of Integration. Proceedings, IEEE
Conference_Location :
San Francisco, CA
Print_ISBN :
0-8186-2049-8
DOI :
10.1109/INFCOM.1990.91310