Presentation 2004-11-09
A Formal Method for Finding the Lowest Cost Attack on Cryptographic Protocols
Takane UMAYAMA, Maki YOSHIDA, Toru FUJIWARA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic protocols are insecure even under the assumption that used cryptographic algorithms are secure. In evaluating and redesigning an insecure cryptographic protocol, it is useful to analyze attacks against the protocol. We assume that the cost of each operation which can be excuted by the adversary is given. The cost of an attack is denned as the sum of costs of the operations included in the attack. We extend a formal method which verifies the security of a cryptographic protocol to find the lowest cost attack when the protocol is insecure.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Cryptographic Protocols / Decision Problem of the Security / Formal Verification / Method for Analyzing Attacks
Paper # ISEC2004-87,OIS2004-54
Date of Issue

Conference Information
Committee ISEC
Conference Date 2004/11/2(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Formal Method for Finding the Lowest Cost Attack on Cryptographic Protocols
Sub Title (in English)
Keyword(1) Cryptographic Protocols
Keyword(2) Decision Problem of the Security
Keyword(3) Formal Verification
Keyword(4) Method for Analyzing Attacks
1st Author's Name Takane UMAYAMA
1st Author's Affiliation Graduate School of Information Science and Technology, Osaka University()
2nd Author's Name Maki YOSHIDA
2nd Author's Affiliation Graduate School of Information Science and Technology, Osaka University
3rd Author's Name Toru FUJIWARA
3rd Author's Affiliation Graduate School of Information Science and Technology, Osaka University
Date 2004-11-09
Paper # ISEC2004-87,OIS2004-54
Volume (vol) vol.104
Number (no) 422
Page pp.pp.-
#Pages 8
Date of Issue