dc.contributor.author |
Lukell, S A
|
|
dc.contributor.author |
Hutchison, A C M
|
|
dc.date.accessioned |
2016-09-19T07:23:51Z |
|
dc.date.available |
2016-09-19T07:23:51Z |
|
dc.date.issued |
2003 |
|
dc.identifier.citation |
Lukell, S. A., & Hutchison, A. C. M. (2003). Attack analysis of cryptographic protocols using strand spaces. South African Computer Journal, (31), p-25. |
|
dc.identifier.uri |
http://hdl.handle.net/11427/21792
|
|
dc.description.abstract |
Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security of a communications system. In fact, it is recognised that the engineering of security protocols is a challenging task, since protocols that appear secure can contain subtle flaws that attackers can exploit. A number of techniques exist for the analysis of security protocol specifications. Individually they are not capable of detecting every possible flaw or attack against a protocol. However, when combined, these techniques all complement each other, allowing a protocol engineer to obtain a more accurate overview of the security of a protocol that is being designed. This is the rationale for multi-dimensional security protocol engineering, a concept introduced by previous projects of ours over several years. We propose an attack construction approach to security protocol analysis within a multi-dimensional context. This analysis method complements the existing inference construction analysis tools developed earlier in the group. We give a brief overview of the concepts associated with the project, including a summary of existing security protocol analysis techniques, and a description of the strand space model, which is the intended formalism for the analysis. |
|
dc.language.iso |
eng |
|
dc.source |
South African Computer Journal |
|
dc.source.uri |
http://sacj.cs.uct.ac.za/
|
|
dc.subject.other |
Security protocols |
|
dc.subject.other |
cryptographic protocols |
|
dc.subject.other |
analysis |
|
dc.subject.other |
strand space model |
|
dc.title |
Attack analysis of cryptographic protocols using strand spaces |
|
dc.type |
Journal Article |
|
dc.date.updated |
2016-01-05T11:38:36Z |
|
dc.publisher.institution |
University of Cape Town |
|
dc.publisher.faculty |
Faculty of Science |
en_ZA |
dc.publisher.department |
Department of Computer Science |
en_ZA |
uct.type.filetype |
Text |
|
uct.type.filetype |
Image |
|
dc.identifier.apacitation |
Lukell, S. A., & Hutchison, A. C. M. (2003). Attack analysis of cryptographic protocols using strand spaces. <i>South African Computer Journal</i>, http://hdl.handle.net/11427/21792 |
en_ZA |
dc.identifier.chicagocitation |
Lukell, S A, and A C M Hutchison "Attack analysis of cryptographic protocols using strand spaces." <i>South African Computer Journal</i> (2003) http://hdl.handle.net/11427/21792 |
en_ZA |
dc.identifier.vancouvercitation |
Lukell SA, Hutchison ACM. Attack analysis of cryptographic protocols using strand spaces. South African Computer Journal. 2003; http://hdl.handle.net/11427/21792. |
en_ZA |
dc.identifier.ris |
TY -
AU - Lukell, S A
AU - Hutchison, A C M
AB - Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security of a communications system. In fact, it is recognised that the engineering of security protocols is a challenging task, since protocols that appear secure can contain subtle flaws that attackers can exploit. A number of techniques exist for the analysis of security protocol specifications. Individually they are not capable of detecting every possible flaw or attack against a protocol. However, when combined, these techniques all complement each other, allowing a protocol engineer to obtain a more accurate overview of the security of a protocol that is being designed. This is the rationale for multi-dimensional security protocol engineering, a concept introduced by previous projects of ours over several years. We propose an attack construction approach to security protocol analysis within a multi-dimensional context. This analysis method complements the existing inference construction analysis tools developed earlier in the group. We give a brief overview of the concepts associated with the project, including a summary of existing security protocol analysis techniques, and a description of the strand space model, which is the intended formalism for the analysis.
DA - 2003
DB - OpenUCT
DP - University of Cape Town
J1 - South African Computer Journal
LK - https://open.uct.ac.za
PB - University of Cape Town
PY - 2003
T1 - Attack analysis of cryptographic protocols using strand spaces
TI - Attack analysis of cryptographic protocols using strand spaces
UR - http://hdl.handle.net/11427/21792
ER -
|
en_ZA |