A previous study showed how control ow analysis can be applied to analyse key distribution protocols based on symmetric key cryptography. We have extended both the theoretical treatment and our fully automatic verifier to deal with protocols based on asymmetric cryptography. This paper reports on the application of our technique exemplified on the Beller-Chang-Yacobi MSR protocol, which uses both symmetric and asymmetric cryptography and show how we discover an undocumented flaw.

Control Flow Analysis Can Find New Flaws Too

BODEI, CHIARA;DEGANO, PIERPAOLO;
2004-01-01

Abstract

A previous study showed how control ow analysis can be applied to analyse key distribution protocols based on symmetric key cryptography. We have extended both the theoretical treatment and our fully automatic verifier to deal with protocols based on asymmetric cryptography. This paper reports on the application of our technique exemplified on the Beller-Chang-Yacobi MSR protocol, which uses both symmetric and asymmetric cryptography and show how we discover an undocumented flaw.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11568/192364
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact