TY - GEN
T1 - On establishing and fixing a parallel session attack in a security protocol
AU - Dojen, Reiner
AU - Jurcut, Anca
AU - Coffey, Tom
AU - Gyorodi, Cornelia
PY - 2008
Y1 - 2008
N2 - Nowadays mobile and fixed networks are trusted with highly sensitive information, which must be protected by security protocols. However, security protocols are vulnerable to a host of subtle attacks, such as replay, parallel session and type-flaw attacks. Designing protocols to be impervious to these attacks has been proven to be extremely challenging and error prone. This paper discusses various attacks against security protocols. As an example, the security of the Wide-Mouthed Frog key distribution protocol when subjected to known attacks is discussed. Significantly, a hitherto unknown attack on Lowe's modified version of the Wide-Mouthed Frog protocol is presented. Finally, a correction for the protocol to prevent this attack is proposed and discussed.
AB - Nowadays mobile and fixed networks are trusted with highly sensitive information, which must be protected by security protocols. However, security protocols are vulnerable to a host of subtle attacks, such as replay, parallel session and type-flaw attacks. Designing protocols to be impervious to these attacks has been proven to be extremely challenging and error prone. This paper discusses various attacks against security protocols. As an example, the security of the Wide-Mouthed Frog key distribution protocol when subjected to known attacks is discussed. Significantly, a hitherto unknown attack on Lowe's modified version of the Wide-Mouthed Frog protocol is presented. Finally, a correction for the protocol to prevent this attack is proposed and discussed.
KW - Parallel session attack
KW - Protocol flaws
KW - Security protocols
UR - http://www.scopus.com/inward/record.url?scp=51849146179&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-85257-5_24
DO - 10.1007/978-3-540-85257-5_24
M3 - Conference contribution
AN - SCOPUS:51849146179
SN - 9783540852568
T3 - Studies in Computational Intelligence
SP - 239
EP - 244
BT - Intelligent Distributed Computing, Systems and Applications
PB - Springer Verlag
ER -