Using Scyther for analysis SKID3 security
Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 65-66.

Voir la notice de l'article provenant de la source Math-Net.Ru

Results of SKID3 protocol security analysis are provided in this paper. An attempt to find a man-in-the-middle attack on this protocol (mentioned by B. Schneier in his book) was made. For this purpose, the author used the Scyther tool created by Cas Cremers and came to the conclusion that SKID3 is rather invulnarable to the man-in-the-middle attack.
@article{PDM_2010_12_a30,
     author = {M. I. Tsoy},
     title = {Using {Scyther} for analysis {SKID3} security},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {65--66},
     publisher = {mathdoc},
     number = {12},
     year = {2010},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2010_12_a30/}
}
TY  - JOUR
AU  - M. I. Tsoy
TI  - Using Scyther for analysis SKID3 security
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2010
SP  - 65
EP  - 66
IS  - 12
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2010_12_a30/
LA  - ru
ID  - PDM_2010_12_a30
ER  - 
%0 Journal Article
%A M. I. Tsoy
%T Using Scyther for analysis SKID3 security
%J Prikladnaâ diskretnaâ matematika
%D 2010
%P 65-66
%N 12
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2010_12_a30/
%G ru
%F PDM_2010_12_a30
M. I. Tsoy. Using Scyther for analysis SKID3 security. Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 65-66. http://geodesic.mathdoc.fr/item/PDM_2010_12_a30/

[1] Cheremushkin A. V., “Avtomatizirovannye sredstva analiza protokolov”, Prikladnaya diskretnaya matematika, 2009, Prilozhenie No 1, 34–36

[2] Dolev D., Yao A. C., “On the security of public key protocols”, IEEE Trans. Inform. Theory, 29:12 (1983), 198–208 | DOI | MR | Zbl

[3] Cremers C. J. F., Scyther – Semantics and Verification of Security Protocols, Ph. D. dissertation, Eindhoven University of Technology, 2006

[4] Schneier B., Applied Cryptography: Protocols, Algorithms, and Source Code in $C$, 2nd ed., Wiley, 1995 | Zbl

[5] Klark E. M., Gramberg O., Peled D., Verifikatsiya modelei programm: Model Checking, per. s angl., ed. R. Smelyanskii, MTsNMO, M., 2002, 416 pp.