Key substitution in the symbolic analysis of cryptographic protocols

被引:0
|
作者
Chevalier, Yannick [1 ]
Kourjieh, Mounira [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the new signature key. Schemes vulnerable to this attack thus permit an active intruder to claim to be the issuer of a signed message. In this paper, we investigate and solve positively the problem of the decidability of symbolic cryptographic protocol analysis when the signature schemes employed in the concrete realisation have this property.
引用
收藏
页码:121 / 132
页数:12
相关论文
共 50 条
  • [31] Honest functions and their application to the analysis of cryptographic protocols
    Maneki, Alfred P.
    Proceedings of the Computer Security Foundations Workshop, 1999, : 83 - 89
  • [32] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [33] Transducer-based analysis of cryptographic protocols
    Kuesters, Ralf
    Wilke, Thomas
    INFORMATION AND COMPUTATION, 2007, 205 (12) : 1741 - 1776
  • [34] Performance analysis of cryptographic protocols on handheld devices
    Argyroudis, PG
    Verma, R
    Tewari, H
    O'Mahony, D
    THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 169 - 174
  • [35] CRYPTOBAP: A Binary Analysis Platform for Cryptographic Protocols
    Nasrabadi, Faezeh
    Kuennemann, Robert
    Nemati, Hamed
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1362 - 1376
  • [36] Formal analysis and design principles of cryptographic protocols
    Xu, X.D.
    Yue, D.W.
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
  • [37] Deciding Security Properties for Cryptographic Protocols. Application to Key Cycles
    Comon-Lundh, Hubert
    Cortier, Veronique
    Zalinescu, Eugen
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2010, 11 (02)
  • [38] A Formal Analysis Method with Reasoning for Cryptographic Protocols
    Yan, Jingchen
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 566 - 570
  • [39] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [40] Formal Analysis for Cryptographic Protocols on a Trace Semantics
    Jiang, Yun
    Gong, HuaPing
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129