Show simple item record

Attack analysis of cryptographic protocols using strand spaces

dc.contributor.authorLukell, S A
dc.date.accessioned2016-09-19T07:23:51Z
dc.date.accessioned2018-11-26T13:53:58Z
dc.date.available2016-09-19T07:23:51Z
dc.date.available2018-11-26T13:53:58Z
dc.date.issued2003
dc.identifier.citationLukell, S. A., & Hutchison, A. C. M. (2003). Attack analysis of cryptographic protocols using strand spaces. South African Computer Journal, (31), p-25.
dc.identifier.urihttp://hdl.handle.net/11427/21792
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/11427/21792
dc.description.abstractSecurity protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security of a communications system. In fact, it is recognised that the engineering of security protocols is a challenging task, since protocols that appear secure can contain subtle flaws that attackers can exploit. A number of techniques exist for the analysis of security protocol specifications. Individually they are not capable of detecting every possible flaw or attack against a protocol. However, when combined, these techniques all complement each other, allowing a protocol engineer to obtain a more accurate overview of the security of a protocol that is being designed. This is the rationale for multi-dimensional security protocol engineering, a concept introduced by previous projects of ours over several years. We propose an attack construction approach to security protocol analysis within a multi-dimensional context. This analysis method complements the existing inference construction analysis tools developed earlier in the group. We give a brief overview of the concepts associated with the project, including a summary of existing security protocol analysis techniques, and a description of the strand space model, which is the intended formalism for the analysis.
dc.sourceSouth African Computer Journal
dc.source.urihttp://sacj.cs.uct.ac.za/
dc.subject.otherSecurity protocols
dc.titleAttack analysis of cryptographic protocols using strand spaces
dc.date.updated2016-01-05T11:38:36Z
dc.publisher.institutionUniversity of Cape Town
dc.publisher.facultyFaculty of Scienceen_ZA
dc.publisher.departmentDepartment of Computer Scienceen_ZA


Files in this item

FilesSizeFormatView
article_2003_lukell_s_hutchison_acm.pdf62.52Kbapplication/pdfView/Open

This item appears in the following Collection(s)

Show simple item record