Analysing protocols subject to guessing attacks

In this paper we consider guessing attacks upon security protocols, where an intruder guesses one of the values used (typically a poorly-chosen password) and then seeks to verify that guess. We formalise such attacks, and in particular the way in which the guess is verified. We then describe how to...

Full description

Saved in:
Bibliographic Details
Published inJournal of computer security Vol. 12; no. 1; pp. 83 - 97
Main Author Lowe, Gavin
Format Journal Article
LanguageEnglish
Published London, England SAGE Publications 01.01.2004
Online AccessGet full text
ISSN0926-227X
1875-8924
DOI10.3233/JCS-2004-12104

Cover

More Information
Summary:In this paper we consider guessing attacks upon security protocols, where an intruder guesses one of the values used (typically a poorly-chosen password) and then seeks to verify that guess. We formalise such attacks, and in particular the way in which the guess is verified. We then describe how to model such attacks within the process algebra CSP, so that they can be detected using the model checker FDR, and illustrate our technique on some examples.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:0926-227X
1875-8924
DOI:10.3233/JCS-2004-12104