Authors
Anish Mathuria, Aditya Raj Singh, P Venkat Sharavan, Rohit Kirtankar
Publication date
2007/12/18
Conference
15th International Conference on Advanced Computing and Communications (ADCOM 2007)
Pages
465-471
Publisher
IEEE
Description
Security protocols are often designed and analyzed in isolation. In the real world, however, more than one protocol may be executed concurrently, possibly with the same keying material. An intruder may therefore be able to manipulate messages from different protocols in order to break the security of an otherwise secure protocol. Attacks involving interactions between different protocols, also referred to as multi-protocol attacks, have appeared less frequently in the literature than attacks involving single protocols. This paper presents multi-protocol attacks on several existing protocols that are believed to be resistant to attacks when used in isolation.
Total citations
200720082009201020112012201320142015201620171111313
Scholar articles
A Mathuria, AR Singh, PV Sharavan, R Kirtankar - 15th International Conference on Advanced Computing …, 2007