مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

1,030
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

ANALYZING THE INTRUDER ROLE IN CRYPTOGRAPHIC PROTOCOLS

Pages

  1-14

Abstract

 In this paper a method for analyzing the role of the intruder and automatic exploration of possible attack scenarios in CRYPTOGRAPHIC PROTOCOLS is presented. In the presented method, the intruder’s capability for eavesdropping the protocol messages and using them to masquerade the protocol principals by means of a set of inference capabilities is modeled. Furthermore, the existence of a proper attack strategy as a general capability of an intelligent intruder for designing the attack scenario is considered in the model. The intruder strategy is based on finding proper instances of the protocol execution as a source of obtaining necessary attack information. Two important properties of the CRYPTOGRAPHIC PROTOCOLS (i.e. secrecy and authentication) can be analyzed using the presented method. To show the strength of the presented method, formal specification of the Woo-Lam authentication protocol and the way of finding an attack scenario against it is described as a sample.

Cites

  • No record.
  • References

    Cite

    APA: Copy

    TORK LADANI, B., & JALILI, S.. (2005). ANALYZING THE INTRUDER ROLE IN CRYPTOGRAPHIC PROTOCOLS. JOURNAL OF FACULTY OF ENGINEERING (UNIVERSITY OF TABRIZ), 32(3 (40) ELECTRONICS), 1-14. SID. https://sid.ir/paper/43788/en

    Vancouver: Copy

    TORK LADANI B., JALILI S.. ANALYZING THE INTRUDER ROLE IN CRYPTOGRAPHIC PROTOCOLS. JOURNAL OF FACULTY OF ENGINEERING (UNIVERSITY OF TABRIZ)[Internet]. 2005;32(3 (40) ELECTRONICS):1-14. Available from: https://sid.ir/paper/43788/en

    IEEE: Copy

    B. TORK LADANI, and S. JALILI, “ANALYZING THE INTRUDER ROLE IN CRYPTOGRAPHIC PROTOCOLS,” JOURNAL OF FACULTY OF ENGINEERING (UNIVERSITY OF TABRIZ), vol. 32, no. 3 (40) ELECTRONICS, pp. 1–14, 2005, [Online]. Available: https://sid.ir/paper/43788/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top