[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks

Published: 01 January 2006 Publication History

Abstract

We consider the problem of formal automatic verification of cryptographic protocols when some data, like poorly chosen passwords, can be guessed by dictionary attacks. First, we define a theory of these attacks and propose an inference system modeling the deduction capabilities of an intruder. This system extends a set of well-studied deduction rules for symmetric and public key encryption, often called Dolev---Yao rules, with the introduction of a probabilistic encryption operator and guessing abilities for the intruder. Then, we show that the intruder deduction problem in this extended model is decidable in PTIME. The proof is based on a locality lemma for our inference system. This first result yields to an NP decision procedure for the protocol insecurity problem in the presence of a passive intruder. In the active case, the same problem is proved to be NP-complete: we give a procedure for simultaneously solving symbolic constraints with variables that represent intruder deductions. We illustrate the procedure with examples of published protocols and compare our model to other recent formal definitions of dictionary attacks.

Cited By

View all
  • (2014)Formal Models and Techniques for Analyzing Security ProtocolsFoundations and Trends in Programming Languages10.1561/25000000011:3(151-267)Online publication date: 13-Nov-2014
  • (2008)Approximation-based tree regular model-checkingNordic Journal of Computing10.5555/1737763.173776714:3(216-241)Online publication date: 1-Sep-2008

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Automated Reasoning
Journal of Automated Reasoning  Volume 36, Issue 1-2
January 2006
172 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 January 2006

Author Tags

  1. cryptographic protocols
  2. dictionary attacks
  3. formal methods
  4. probabilistic encryption
  5. verification

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Formal Models and Techniques for Analyzing Security ProtocolsFoundations and Trends in Programming Languages10.1561/25000000011:3(151-267)Online publication date: 13-Nov-2014
  • (2008)Approximation-based tree regular model-checkingNordic Journal of Computing10.5555/1737763.173776714:3(216-241)Online publication date: 1-Sep-2008

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media