Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols

被引:1
|
作者
Bao, Da [1 ]
Wagatsuma, Kazunori [1 ]
Gao, Hongbiao [1 ]
Cheng, Jingde [1 ]
机构
[1] Saitama Univ, Dept Informat & Comp Sci, Saitama, Japan
关键词
Information security; Predict new attacks; Attack analysis; Forward reasoning; Cryptographic protocols; LOGIC;
D O I
10.1007/978-981-10-1536-6_35
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Knowledge about attacks is a necessary foundation for security analysis of information systems or cryptographic protocols. Current security verification methods for improving the security of target systems or the soundness of cryptographic protocols has limitations because they are all based on the assumptions from known attacks, while the attackers are trying every possible attacks against the information systems. Once a new-style attack was found by adversaries earlier, it would bring severe loss to the target systems. Therefore, it is essential to understand and take measures against new attacks previously. A new method has been proposed for predicting new attacks, but it lacks experimental results to prove its effectiveness. This paper confirms the effectiveness of the proposed method by a rediscovery experiment that shows several known attacks on cryptographic protocols rediscovered successfully. The paper also shows issues of the approach for predicting new attacks.
引用
收藏
页码:263 / 270
页数:8
相关论文
共 50 条
  • [1] Automatic detection of attacks on cryptographic protocols: A case study
    Cibrario, I
    Durante, L
    Sisto, R
    Valenzano, A
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 69 - 84
  • [2] A NEW METHOD FOR ANALYZING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    TOUSSAINT, MJ
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 702 - 714
  • [3] Security-typed languages for implementation of cryptographic protocols: A case study
    Askarov, A
    Sabelfeld, A
    [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 197 - 221
  • [4] On the security of αη:: Response to 'some attacks on quantum-based cryptographic protocols'
    Yuen, Horace P.
    Nair, Ranjith
    Corndorf, Eric
    Kanter, Gregory S.
    Kumar, Prem
    [J]. QUANTUM INFORMATION & COMPUTATION, 2006, 6 (07) : 561 - 582
  • [5] Superposition Attacks on Cryptographic Protocols
    Damgard, Ivan
    Funder, Jakob
    Nielsen, Jesper Buus
    Salvail, Louis
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
  • [6] Synthesising attacks on cryptographic protocols
    Sinclair, D
    Gray, D
    Hamilton, G
    [J]. AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63
  • [7] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    [J]. Science China(Information Sciences), 2004, (02) : 199 - 220
  • [8] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [9] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [10] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220