A Quantitative Study of Two Attacks

We use a special operational semantics which helps us in predicting quantitative measures on systems describing cryptographic protocols: We also consider a possible attacker. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.

[1]  Corrado Priami Language-based Performance Prediction for Distributed and Mobile Systems , 2002, Inf. Comput..

[2]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[3]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[4]  Catherine A. Meadows,et al.  A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..

[5]  Robin Milner,et al.  A Calculus of Mobile Processes, II , 1992, Inf. Comput..

[6]  Corrado Priami,et al.  Enhanced operational semantics , 1996, CSUR.

[7]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[8]  Robin Milner,et al.  A Calculus of Mobile Processes, II , 1992, Inf. Comput..

[9]  Corrado Priami,et al.  Performance Evaluation of Mobile Processes via Abstract Machines , 2001, IEEE Trans. Software Eng..

[10]  Martín Abadi,et al.  A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..

[11]  Flemming Nielson,et al.  A calculus for control flow analysis of security protocols , 2004, International Journal of Information Security.

[12]  William A. Arbaugh,et al.  YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .

[13]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[14]  PEPAGraham Clark Formalising the Specification of Rewardswith , 1996 .

[15]  Dawn Xiaodong Song,et al.  A First Step Towards the Automatic Generation of Security Protocols , 2000, NDSS.

[16]  Iliano Cervesato Fine-Grained MSR Specifications for Quantitative Security Analysis , 2004 .

[17]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[18]  Flemming Nielson,et al.  Automatic validation of protocol narration , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..

[19]  Corrado Priami,et al.  Enhanced operational semantics: a tool for describing and analyzing concurrent systems , 2001, CSUR.

[20]  Jane Hillston,et al.  A compositional approach to performance modelling , 1996 .

[21]  Flemming Nielson,et al.  Performance Evaluation of Security Protocols Specified in LySa , 2004, QAPL.

[22]  Corrado Priami,et al.  Non-Interleaving Semantics for Mobile Processes , 1999, Theor. Comput. Sci..

[23]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[24]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[25]  Holger Hermanns,et al.  Stochastic Process Algebras - Between LOTOS and Markov Chains , 1998, Comput. Networks.