Counterexample Generation for Ping-Pong Protocols Security Checking Algorithm

被引:0
作者
Wahyudi, Erwin Eko [1 ]
Pulungan, Reza [1 ]
机构
[1] Univ Gadjah Mada, Fac Math & Nat Sci, Dept Comp Sci & Elect, Yogyakarta, Indonesia
来源
2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT) | 2018年
关键词
protocol security; counterexamples; ping-pong protocol; cryptography; AUTHENTICATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An improperly designed protocol for sending a message could be vulnerable to an active attacker. A protocol for sending a message is called secure if any attacker cannot obtain the original message. If a protocol is unsecure, an attacker may perform some operations to obtain the original message. Dolev et al. proposed an algorithm to check the security of ping-pong protocols using nondeterministic finite automata. In this paper, we propose an algorithm for generating counterexamples of unsecure protocols by storing the counterexamples using dynamic programming technique.
引用
收藏
页码:293 / 298
页数:6
相关论文
共 12 条
[1]  
Backes M, 2003, LECT NOTES COMPUT SC, V2914, P1
[2]  
Baskar A, 2009, LECT NOTES COMPUT SC, V5913, P137, DOI 10.1007/978-3-642-10622-4_11
[3]  
Daubignard M., 2013, SECURE KEY MANAGEMEN
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   ON THE SECURITY OF PING-PONG PROTOCOLS [J].
DOLEV, D ;
EVEN, S ;
KARP, RM .
INFORMATION AND CONTROL, 1982, 55 (1-3) :57-68
[6]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[7]  
Lowe G., 1996, Tools and Algorithms for the Construction and Analysis of Systems. Second International Workshop, TACAS '96. Proceedings, P147
[8]   AN ATTACK ON THE NEEDHAM-SCHROEDER PUBLIC-KEY AUTHENTICATION PROTOCOL [J].
LOWE, G .
INFORMATION PROCESSING LETTERS, 1995, 56 (03) :131-133
[9]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999
[10]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017