The Risks of Compromising Secret Information
This paper presents a taxonomy of known-key attacks on athenticated key agreement protocols, which is based on the adversaries’ roles and objectives. The taxonomy is illustrated using new attacks on the Just-Vaudenay and Yacobi protocol. The taxonomy is used to discuss countermeasures and protocol a...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This paper presents a taxonomy of known-key attacks on athenticated key agreement protocols, which is based on the adversaries’ roles and objectives. The taxonomy is illustrated using new attacks on the Just-Vaudenay and Yacobi protocol. The taxonomy is used to discuss countermeasures and protocol analysis methods against known-key attacks. |
---|---|
ISSN: | 0302-9743 1611-3349 |
DOI: | 10.1007/3-540-36159-6_11 |