Using Scyther for analysis SKID3 security
Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 65-66
Cet article a éte moissonné depuis la source Math-Net.Ru
Results of SKID3 protocol security analysis are provided in this paper. An attempt to find a man-in-the-middle attack on this protocol (mentioned by B. Schneier in his book) was made. For this purpose, the author used the Scyther tool created by Cas Cremers and came to the conclusion that SKID3 is rather invulnarable to the man-in-the-middle attack.
@article{PDM_2010_12_a30,
author = {M. I. Tsoy},
title = {Using {Scyther} for analysis {SKID3} security},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {65--66},
year = {2010},
number = {12},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2010_12_a30/}
}
M. I. Tsoy. Using Scyther for analysis SKID3 security. Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 65-66. http://geodesic.mathdoc.fr/item/PDM_2010_12_a30/
[1] Cheremushkin A. V., “Avtomatizirovannye sredstva analiza protokolov”, Prikladnaya diskretnaya matematika, 2009, Prilozhenie No 1, 34–36
[2] Dolev D., Yao A. C., “On the security of public key protocols”, IEEE Trans. Inform. Theory, 29:12 (1983), 198–208 | DOI | MR | Zbl
[3] Cremers C. J. F., Scyther – Semantics and Verification of Security Protocols, Ph. D. dissertation, Eindhoven University of Technology, 2006
[4] Schneier B., Applied Cryptography: Protocols, Algorithms, and Source Code in $C$, 2nd ed., Wiley, 1995 | Zbl
[5] Klark E. M., Gramberg O., Peled D., Verifikatsiya modelei programm: Model Checking, per. s angl., ed. R. Smelyanskii, MTsNMO, M., 2002, 416 pp.