DocumentCode :
2990754
Title :
Verifiable-text attacks in cryptographic protocols
Author :
Gong, Li
Author_Institution :
Comput. Lab., Cambridge Univ., UK
fYear :
1990
fDate :
3-7 Jun 1990
Firstpage :
686
Abstract :
The author introduces a form of attack, a verifiable-test attack, in which an attacker obtains secret information, such as a password used in a protocol, without breaking the underlying cryptosystem. An investigation is made of the essence of a verifiable-text attack, and an algorithm for examining protocols and searching for vulnerabilities to such an attack is developed. Caution has to be exercised in certifying that a protocol is not vulnerable because a healthy protocol may become vulnerable when it interacts with another vulnerable or even healthy protocol
Keywords :
cryptography; protocols; algorithm; cryptographic protocols; password; verifiable-test attack; Authentication; Cryptographic protocols; Cryptography; Dictionaries; Graph theory; Internet; Laboratories; Shape; Space exploration; Trademarks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM '90, Ninth Annual Joint Conference of the IEEE Computer and Communication Societies. The Multiple Facets of Integration. Proceedings, IEEE
Conference_Location :
San Francisco, CA
Print_ISBN :
0-8186-2049-8
Type :
conf
DOI :
10.1109/INFCOM.1990.91310
Filename :
91310
Link To Document :
بازگشت