Feasibility of multi-protocol attacks

被引:20
作者
Cremers, Cas [1 ]
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, NL-5600 MB Eindhoven, Netherlands
来源
FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS | 2006年
关键词
D O I
10.1109/ARES.2006.63
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the existence of multi-protocol attacks on protocols described in literature. Given two or more protocols, that share key structures and are executed in the same environment, are new attacks possible? Out of 30 protocols from literature, we find that 23 are vulnerable to multi-protocol attacks. We identify two likely attack patterns and sketch a tagging scheme to prevent multi-protocol attacks.
引用
收藏
页码:287 / 294
页数:8
相关论文
共 27 条
[1]  
[Anonymous], P 21 NAT INF SYST SE
[2]  
[Anonymous], LNCS
[3]  
[Anonymous], 1997, SEC PROT WORKSH
[4]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[5]  
Boyd C., 2003, Information Security and Cryptography Series
[6]  
CANETTI R, 2002, ENV REQUIREMENTS AUT
[7]  
Canetti Ran, CRYPTOLOGY EPRINT AR
[8]  
CLARK J, SURVEY AUTHENTICATIO
[9]  
CREMERS C, 2003, FAST 2003, P131
[10]  
Cremers C., 2004, COMPOSITIONALITY SEC