On establishing and fixing a parallel session attack in a security protocol

Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Gyorodi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Nowadays mobile and fixed networks are trusted with highly sensitive information, which must be protected by security protocols. However, security protocols are vulnerable to a host of subtle attacks, such as replay, parallel session and type-flaw attacks. Designing protocols to be impervious to these attacks has been proven to be extremely challenging and error prone. This paper discusses various attacks against security protocols. As an example, the security of the Wide-Mouthed Frog key distribution protocol when subjected to known attacks is discussed. Significantly, a hitherto unknown attack on Lowe's modified version of the Wide-Mouthed Frog protocol is presented. Finally, a correction for the protocol to prevent this attack is proposed and discussed.

Original languageEnglish
Title of host publicationIntelligent Distributed Computing, Systems and Applications
Subtitle of host publicationProceedings of the 2nd International Symposium on Intelligent Distributed Computing - IDC 2008, Catania, Italy, 2008
PublisherSpringer Verlag
Pages239-244
Number of pages6
ISBN (Print)9783540852568
DOIs
Publication statusPublished - 2008

Publication series

NameStudies in Computational Intelligence
Volume162
ISSN (Print)1860-949X

Keywords

  • Parallel session attack
  • Protocol flaws
  • Security protocols

Fingerprint

Dive into the research topics of 'On establishing and fixing a parallel session attack in a security protocol'. Together they form a unique fingerprint.

Cite this