Key substitution in the symbolic analysis of cryptographic protocols

被引:0
|
作者
Chevalier, Yannick [1 ]
Kourjieh, Mounira [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the new signature key. Schemes vulnerable to this attack thus permit an active intruder to claim to be the issuer of a signed message. In this paper, we investigate and solve positively the problem of the decidability of symbolic cryptographic protocol analysis when the signature schemes employed in the concrete realisation have this property.
引用
收藏
页码:121 / 132
页数:12
相关论文
共 50 条
  • [41] The modeling analysis of cryptographic protocols using Promela
    Xiao, Meihua
    Li, Jing
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 4321 - +
  • [42] On Formal Analysis of Cryptographic Protocols and Supporting Tool
    Xiao Meihua
    Jiang Yun
    Liu Qiaowei
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 223 - 228
  • [43] Honest functions and their application to the analysis of cryptographic protocols
    Maneki, AP
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 83 - 89
  • [44] Semidirect Products of Finite Groups in Public-Key Cryptographic Protocols
    Lanel, G. H. J.
    Jinasena, T. M. K. K.
    Welihinda, B. A. K.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022, 38 (05) : 1035 - 1050
  • [45] A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
    Véronique Cortier
    Steve Kremer
    Bogdan Warinschi
    Journal of Automated Reasoning, 2011, 46 : 225 - 259
  • [46] Reliability Analysis for Cryptographic Key Management
    Xiao, Sheng
    Gong, Weibo
    Towsley, Don
    Zhang, Qingquan
    Zhu, Ting
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 999 - 1004
  • [47] A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
    Cortier, Veronique
    Kremer, Steve
    Warinschi, Bogdan
    JOURNAL OF AUTOMATED REASONING, 2011, 46 (3-4) : 225 - 259
  • [48] CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms
    Chichester, Dalton
    Du, Wei
    Kauffman, Raymond
    Lin, Hai
    Lynch, Christopher
    Marshall, Andrew M.
    Meadows, Catherine A.
    Narendran, Paliath
    Ravishankar, Veena
    Rovira, Luis
    Rozek, Brandon
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2022, (370): : 147 - 161
  • [49] A method for symbolic analysis of security protocols
    Boreale, M
    Buscemi, MG
    THEORETICAL COMPUTER SCIENCE, 2005, 338 (1-3) : 393 - 425
  • [50] Symbolic approach to the analysis of security protocols
    Lafrance, S
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2004, 10 (09) : 1156 - 1198