@inproceedings{b6267fb3d68a438c9d4755ec8adb5b43,
title = "On establishing and fixing a parallel session attack in a security protocol",
abstract = "Nowadays mobile and fixed networks are trusted with highly sensitive information, which must be protected by security protocols. However, security protocols are vulnerable to a host of subtle attacks, such as replay, parallel session and type-flaw attacks. Designing protocols to be impervious to these attacks has been proven to be extremely challenging and error prone. This paper discusses various attacks against security protocols. As an example, the security of the Wide-Mouthed Frog key distribution protocol when subjected to known attacks is discussed. Significantly, a hitherto unknown attack on Lowe's modified version of the Wide-Mouthed Frog protocol is presented. Finally, a correction for the protocol to prevent this attack is proposed and discussed.",
keywords = "Parallel session attack, Protocol flaws, Security protocols",
author = "Reiner Dojen and Anca Jurcut and Tom Coffey and Cornelia Gyorodi",
year = "2008",
doi = "10.1007/978-3-540-85257-5\_24",
language = "English",
isbn = "9783540852568",
series = "Studies in Computational Intelligence",
publisher = "Springer Verlag",
pages = "239--244",
booktitle = "Intelligent Distributed Computing, Systems and Applications",
}