IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2004-11-09 09:50
A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols
Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
Abstract (in Japanese) (See Japanese page) 
(in English) Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic protocols are insecure even under the assumption that used cryptographic algorithms are secure. In evaluating and redesigning an insecure cryptographic protocol, it is useful to analyze attacks against the protocol. We assume that the cost of each operation which can be excuted by the adversary is given. The cost of an attack is defined as the sum of costs of the operations included in the attack. We extend a formal method which verifies the security of a cryptographic protocol to find the lowest cost attack
when the protocol is insecure.
Keyword (in Japanese) (See Japanese page) 
(in English) Cryptographic Protocols / Decison Problem of the Security / Formal Verification / Method for Analyzing Attacks / / / /  
Reference Info. IEICE Tech. Rep., vol. 104, no. 422, ISEC2004-87, pp. 15-22, Nov. 2004.
Paper # ISEC2004-87 
Date of Issue 2004-11-02 (ISEC, OIS) 
ISSN Print edition: ISSN 0913-5685  Online edition: ISSN 2432-6380
Download PDF

Conference Information
Committee ISEC LOIS  
Conference Date 2004-11-08 - 2004-11-09 
Place (in Japanese) (See Japanese page) 
Place (in English) Osaka Univ. 
Topics (in Japanese) (See Japanese page) 
Topics (in English)  
Paper Information
Registration To ISEC 
Conference Code 2004-11-ISEC-OIS 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols 
Sub Title (in English)  
Keyword(1) Cryptographic Protocols  
Keyword(2) Decison Problem of the Security  
Keyword(3) Formal Verification  
Keyword(4) Method for Analyzing Attacks  
1st Author's Name Takane Umayama  
1st Author's Affiliation Osaka University (Osaka Univ.)
2nd Author's Name Maki Yoshida  
2nd Author's Affiliation Osaka University (Osaka Univ.)
3rd Author's Name Toru Fujiwara  
3rd Author's Affiliation Osaka University (Osaka Univ.)
4th Author's Name  
4th Author's Affiliation ()
5th Author's Name  
5th Author's Affiliation ()
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Date Time 2004-11-09 09:50:00 
Presentation Time 25 
Registration for ISEC 
Paper # IEICE-ISEC2004-87,IEICE-OIS2004-54 
Volume (vol) IEICE-104 
Number (no) no.422(ISEC), no.424(OIS) 
Page pp.15-22 
#Pages IEICE-8 
Date of Issue IEICE-ISEC-2004-11-02,IEICE-OIS-2004-11-02 

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan