Presentation | 2004-11-09 A Formal Method for Finding the Lowest Cost Attack on Cryptographic Protocols Takane UMAYAMA, Maki YOSHIDA, Toru FUJIWARA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic protocols are insecure even under the assumption that used cryptographic algorithms are secure. In evaluating and redesigning an insecure cryptographic protocol, it is useful to analyze attacks against the protocol. We assume that the cost of each operation which can be excuted by the adversary is given. The cost of an attack is denned as the sum of costs of the operations included in the attack. We extend a formal method which verifies the security of a cryptographic protocol to find the lowest cost attack when the protocol is insecure. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cryptographic Protocols / Decision Problem of the Security / Formal Verification / Method for Analyzing Attacks |
Paper # | ISEC2004-87,OIS2004-54 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2004/11/2(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Formal Method for Finding the Lowest Cost Attack on Cryptographic Protocols |
Sub Title (in English) | |
Keyword(1) | Cryptographic Protocols |
Keyword(2) | Decision Problem of the Security |
Keyword(3) | Formal Verification |
Keyword(4) | Method for Analyzing Attacks |
1st Author's Name | Takane UMAYAMA |
1st Author's Affiliation | Graduate School of Information Science and Technology, Osaka University() |
2nd Author's Name | Maki YOSHIDA |
2nd Author's Affiliation | Graduate School of Information Science and Technology, Osaka University |
3rd Author's Name | Toru FUJIWARA |
3rd Author's Affiliation | Graduate School of Information Science and Technology, Osaka University |
Date | 2004-11-09 |
Paper # | ISEC2004-87,OIS2004-54 |
Volume (vol) | vol.104 |
Number (no) | 422 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |