Presentation | 2006-11-10 Verification Methods for Security Protocols (1) : Typical Errors in Security Proofs for Key Exchange Protocols Kenji IMAMOTO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Although several mathematical approaches for proving security of a protocol have been proposed so far, since high knowledge on mathematical is required to understand proof, insecure protocols are sometimes regarded as secure one (due to their misunderstood proof). This paper introduces a key exchange protocol proposed by Boyd et al. [3] as an example, and shows what kind of error/attack exists. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Proveable security / key exchange protocol / proof error |
Paper # | AI2006-16 |
Date of Issue |
Conference Information | |
Committee | AI |
---|---|
Conference Date | 2006/11/3(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Artificial Intelligence and Knowledge-Based Processing (AI) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Verification Methods for Security Protocols (1) : Typical Errors in Security Proofs for Key Exchange Protocols |
Sub Title (in English) | |
Keyword(1) | Proveable security |
Keyword(2) | key exchange protocol |
Keyword(3) | proof error |
1st Author's Name | Kenji IMAMOTO |
1st Author's Affiliation | Faculty of Information Science and Electrical Engineering, Kyushu University() |
Date | 2006-11-10 |
Paper # | AI2006-16 |
Volume (vol) | vol.106 |
Number (no) | 340 |
Page | pp.pp.- |
#Pages | 4 |
Date of Issue |