Article ID Journal Published Year Pages File Type
424199 Electronic Notes in Theoretical Computer Science 2006 23 Pages PDF
Abstract

This paper contributes to further closing the gap between formal analysis and concrete implementations of security protocols by introducing a quantitative extension of the usual Dolev-Yao intruder model. This extended model provides a basis for considering protocol attacks that are possible when the intruder has a reasonable amount of computational power, in particular when he is able, with a certain probability, to guess encryption keys or other particular kind of data such as the body of a hashed message. We also show that these extensions do not augment the computational complexity of the protocol insecurity problem in the case of a finite number of interleaved protocol sessions.

Related Topics
Physical Sciences and Engineering Computer Science Computational Theory and Mathematics