Key substitution in the symbolic analysis of cryptographic protocols

被引:0
|
作者
Chevalier, Yannick [1 ]
Kourjieh, Mounira [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the new signature key. Schemes vulnerable to this attack thus permit an active intruder to claim to be the issuer of a signed message. In this paper, we investigate and solve positively the problem of the decidability of symbolic cryptographic protocol analysis when the signature schemes employed in the concrete realisation have this property.
引用
收藏
页码:121 / 132
页数:12
相关论文
共 50 条
  • [21] Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure
    Luo, Shoufu
    Seideman, Jeremy D.
    Dietrich, Sven
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 170 - 179
  • [22] Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
    Aly, Abdelrahaman
    Ashur, Tomer
    Ben-Sasson, Eli
    Dhooghe, Siemen
    Szepieniec, Alan
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 1 - 45
  • [23] Controlling the key by choosing the detection bits in quantum cryptographic protocols
    LIU Bin
    GAO Fei
    HUANG Wei
    LI Dan
    WEN QiaoYan
    Science China(Information Sciences), 2015, 58 (11) : 200 - 210
  • [24] Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
    Z. Lipiński
    Applicable Algebra in Engineering, Communication and Computing, 2021, 32 : 81 - 96
  • [25] Controlling the key by choosing the detection bits in quantum cryptographic protocols
    Liu Bin
    Gao Fei
    Huang Wei
    Li Dan
    Wen QiaoYan
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 11
  • [26] Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
    Lipinski, Z.
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2021, 32 (01) : 81 - 96
  • [27] A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
    Delaune, Stephanie
    Hirschi, Lucca
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2017, 87 : 127 - 144
  • [28] Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
    Fischlin, Marc
    Mazaheri, Sogol
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 76 - 90
  • [29] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    Science China(Information Sciences), 2004, (02) : 199 - 220
  • [30] Honest functions and their application to the analysis of cryptographic protocols
    Maneki, Alfred P.
    Proceedings of the Computer Security Foundations Workshop, 1999, : 83 - 89