University of Limerick
Browse

Weakening the Dolev-Yao model through probability

Download (528.23 kB)
conference contribution
posted on 2012-12-20, 15:32 authored by Riccardo Bresciani, Andrew Butterfield
The Dolev-Yao model has been widely used in protocol verificaion and has been implemented in many protocol verifiers. There are strong assumptions underlying this model, such as perfect cryptography: the aim of the present work is to propose an approach to weaken this hypothesis, by means of probabilistic considerations on the strength of crypto- graphic functions. Such an approach may effectively be implemented in actual protocol verifiers. The Yahalom proto- col is used as an easy example to show this approach.

History

Publication

SIN '09 Proceedings of the 2nd international conference on Security of information and networks;pp. 293-297

Publisher

Association for Computing Machinery

Note

peer-reviewed

Other Funding information

SFI

Rights

2009"© ACM. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SIN '09: Proceedings of the 2nd international conference on Security of information and networks http://dx.doi.org/10.1145/1626195.1626265

Language

English

Usage metrics

    University of Limerick

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC