Analysing protocols subject to guessing attacks

Abstract

In this paper we consider guessing attacks upon security protocols, where an intruder guesses one of the values used (typically a poorlychosen password) and then seeks to verify that guess. We formalise such attacks, and in particular the way in which the guess is verified. We then describe how to model such attacks within the process algebra CSP, so that… (More)

Topics

Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.

Statistics

01020'03'05'07'09'11'13'15'17
Citations per Year

86 Citations

Semantic Scholar estimates that this publication has 86 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics