Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks
Steve Kremer and Mark D. Ryan. Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. In Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'04), pp. 84–107, Electronic Notes in Theoretical Computer Science 128, Elsevier Science Publishers, London, UK, May 2005.
doi:10.1016/j.entcs.2004.11.043
Download
Abstract
In this paper we report on an analysis for finding known-pair and chosen-text attacks in protocols. As these attacks are at the level of blocks, we extend the attacker by special capabilities related to block chaining techniques. The analysis is automated using Blanchet's protocol verifier and illustrated on two well-known protocols, the Needham-Schroeder-Lowe public-key protocol as well as the Needham-Schroeder symmetric-key protocol. On the first protocol, we show how the special intruder capabilities related to chaining may compromise the secrecy of nonces and that chosen-ciphertext attacks are possible. We propose two modified versions of the protocol which strengthen its security. We then illustrate known-pair and chosen-plaintext attacks on the second protocol.
BibTeX
@inproceedings{KremerRyan2004, abstract = {In this paper we report on an analysis for finding known-pair and chosen-text attacks in protocols. As these attacks are at the level of blocks, we extend the attacker by special capabilities related to block chaining techniques. The analysis is automated using Blanchet's protocol verifier and illustrated on two well-known protocols, the Needham-Schroeder-Lowe public-key protocol as well as the Needham-Schroeder symmetric-key protocol. On the first protocol, we show how the special intruder capabilities related to chaining may compromise the secrecy of nonces and that chosen-ciphertext attacks are possible. We propose two modified versions of the protocol which strengthen its security. We then illustrate known-pair and chosen-plaintext attacks on the second protocol.}, address = {London, UK}, author = {Kremer, Steve and Ryan, Mark D.}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}ecurity {I}ssues in {C}oordination {M}odels, {L}anguages and {S}ystems ({SecCo}'04)}, DOI = {10.1016/j.entcs.2004.11.043}, editor = {Focardi, Riccardo and Zavattaro, Gianluigi}, month = may, number = {5}, pages = {84-107}, publisher = {Elsevier Science Publishers}, series = {Electronic Notes in Theoretical Computer Science}, title = {Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks}, volume = {128}, year = {2005}, acronym = {{SecCo}'04}, nmonth = {5}, conf-year = {2004}, conf-month = aug, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-secco04.pdf}, }