Sciweavers

IEEEARES
2007
IEEE

Attacks are Protocols Too

14 years 5 months ago
Attacks are Protocols Too
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe is run inside a malicious agent communicating with normal agents. The simulator is also able to detect flaws in attacks: a previously unreported error on an attack on the Shamir Rivest Adelman is detected by simulation.
Anders Moen Hagalisletto
Added 03 Jun 2010
Updated 03 Jun 2010
Type Conference
Year 2007
Where IEEEARES
Authors Anders Moen Hagalisletto
Comments (0)