Cryptographic protocol flaws: know your enemy
- 17 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 192-200
- https://doi.org/10.1109/csfw.1994.315934
Abstract
Flaws are introduced at every stage of the protocol development cycle. The engineer is faced with the problem of how to avoid them. The first step is to gain an understanding of the different flavours of cryptographic protocol flaws, i.e. get to know the enemy. This paper provides a classification of protocol flaws, including two new flaws in an application of the mental poker protocol, and discusses appropriate countermeasures for relevant flaw-categories.Keywords
This publication has 31 references indexed in Scilit:
- Roles in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On key distribution protocols for repeated authenticationACM SIGOPS Operating Systems Review, 1993
- Protecting poorly chosen secrets from guessing attacksIEEE Journal on Selected Areas in Communications, 1993
- Adding time to a logic of authenticationPublished by Association for Computing Machinery (ACM) ,1993
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- How to (Selectively) Broadcast A SecretPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Timestamps in key distribution protocolsCommunications of the ACM, 1981