首页> 外文会议>International Joint Conference on Automated Reasoning(IJCAR 2004); 20040704-20040708; Cork; GB >Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
【24h】

Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures

机译:通过驳斥不正确的归纳猜想来攻击用于组密钥协商的协议

获取原文
获取原文并翻译 | 示例

摘要

Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party protocols may not be able to model a group protocol, or its intended security properties. Frequently, such tools require an abstraction to a group of fixed size to be made before the automated analysis takes place. This can prejudice chances of finding attacks on the protocol. In this paper, we describe CORAL, our system for finding security protocol attacks by refuting incorrect inductive conjectures. We have used CORAL to model a group key protocol in a general way. By posing inductive conjectures about the trace of messages exchanged, we can investigate novel properties of the protocol, such as tolerance to disruption, and whether it results in agreement on a single key. This has allowed us to find three distinct novel attacks on groups of size two and three.
机译:用于查找对有缺陷的安全协议的攻击的自动化工具通常很难处理组密钥协议的协议。为固定的2或3方协议设计的系统可能无法对组协议或其预期的安全性进行建模。通常,此类工具需要在进行自动分析之前将抽象为一组固定大小。这可能会损害对协议进行攻击的机会。在本文中,我们描述了CORAL,该系统通过反驳错误的归纳猜想来发现安全协议攻击。我们已使用CORAL以一般方式为组密钥协议建模。通过对交换的消息的痕迹进行归纳推测,我们可以研究协议的新属性,例如对中断的容忍度以及它是否导致对单个密钥的同意。这使我们能够对大小为2和3的组找到三种不同的新颖攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号