Attack analysis of cryptographic protocols using strand spaces

 

Show simple item record

dc.contributor.author Lukell, S A
dc.contributor.author Hutchison, A C M
dc.date.accessioned 2016-09-19T07:23:51Z
dc.date.available 2016-09-19T07:23:51Z
dc.date.issued 2003
dc.identifier.citation Lukell, S. A., & Hutchison, A. C. M. (2003). Attack analysis of cryptographic protocols using strand spaces. South African Computer Journal, (31), p-25.
dc.identifier.uri http://hdl.handle.net/11427/21792
dc.description.abstract Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security of a communications system. In fact, it is recognised that the engineering of security protocols is a challenging task, since protocols that appear secure can contain subtle flaws that attackers can exploit. A number of techniques exist for the analysis of security protocol specifications. Individually they are not capable of detecting every possible flaw or attack against a protocol. However, when combined, these techniques all complement each other, allowing a protocol engineer to obtain a more accurate overview of the security of a protocol that is being designed. This is the rationale for multi-dimensional security protocol engineering, a concept introduced by previous projects of ours over several years. We propose an attack construction approach to security protocol analysis within a multi-dimensional context. This analysis method complements the existing inference construction analysis tools developed earlier in the group. We give a brief overview of the concepts associated with the project, including a summary of existing security protocol analysis techniques, and a description of the strand space model, which is the intended formalism for the analysis.
dc.language.iso eng
dc.source South African Computer Journal
dc.source.uri http://sacj.cs.uct.ac.za/
dc.subject.other Security protocols
dc.subject.other cryptographic protocols
dc.subject.other analysis
dc.subject.other strand space model
dc.title Attack analysis of cryptographic protocols using strand spaces
dc.type Journal Article
dc.date.updated 2016-01-05T11:38:36Z
dc.publisher.institution University of Cape Town
dc.publisher.faculty Faculty of Science en_ZA
dc.publisher.department Department of Computer Science en_ZA
uct.type.filetype Text
uct.type.filetype Image
dc.identifier.apacitation Lukell, S. A., & Hutchison, A. C. M. (2003). Attack analysis of cryptographic protocols using strand spaces. <i>South African Computer Journal</i>, http://hdl.handle.net/11427/21792 en_ZA
dc.identifier.chicagocitation Lukell, S A, and A C M Hutchison "Attack analysis of cryptographic protocols using strand spaces." <i>South African Computer Journal</i> (2003) http://hdl.handle.net/11427/21792 en_ZA
dc.identifier.vancouvercitation Lukell SA, Hutchison ACM. Attack analysis of cryptographic protocols using strand spaces. South African Computer Journal. 2003; http://hdl.handle.net/11427/21792. en_ZA
dc.identifier.ris TY - AU - Lukell, S A AU - Hutchison, A C M AB - Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security of a communications system. In fact, it is recognised that the engineering of security protocols is a challenging task, since protocols that appear secure can contain subtle flaws that attackers can exploit. A number of techniques exist for the analysis of security protocol specifications. Individually they are not capable of detecting every possible flaw or attack against a protocol. However, when combined, these techniques all complement each other, allowing a protocol engineer to obtain a more accurate overview of the security of a protocol that is being designed. This is the rationale for multi-dimensional security protocol engineering, a concept introduced by previous projects of ours over several years. We propose an attack construction approach to security protocol analysis within a multi-dimensional context. This analysis method complements the existing inference construction analysis tools developed earlier in the group. We give a brief overview of the concepts associated with the project, including a summary of existing security protocol analysis techniques, and a description of the strand space model, which is the intended formalism for the analysis. DA - 2003 DB - OpenUCT DP - University of Cape Town J1 - South African Computer Journal LK - https://open.uct.ac.za PB - University of Cape Town PY - 2003 T1 - Attack analysis of cryptographic protocols using strand spaces TI - Attack analysis of cryptographic protocols using strand spaces UR - http://hdl.handle.net/11427/21792 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record