[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Cryptographic Attack Metrics

  • Chapter
Dependability Metrics

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4909))

Abstract

When evaluating systems containing cryptographic components, the question arises how to measure the security provided by the cryptography included in the system. In this chapter we highlight the difficulties involved and show that, while measuring cryptographic security is desirable, the opposite point of view, i.e. measuring cryptographic insecurity using attack metrics, yields useful results and behaves reasonably under composition of cryptographic components.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Editor information

Irene Eusgeld Felix C. Freiling Ralf Reussner

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Benenson, Z., Kühn, U., Lucks, S. (2008). Cryptographic Attack Metrics. In: Eusgeld, I., Freiling, F.C., Reussner, R. (eds) Dependability Metrics. Lecture Notes in Computer Science, vol 4909. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68947-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-68947-8_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68946-1

  • Online ISBN: 978-3-540-68947-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics