Sciweavers

SPW
1997
Springer

Protocol Interactions and the Chosen Protocol Attack

13 years 8 months ago
Protocol Interactions and the Chosen Protocol Attack
There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions between protocols, and present a new attack, called the chosen protocol attack, in which an attacker may write a new protocol using the same key material as a target protocol, which is individually very strong, but which interacts with the target protocol in a security-relevant way. We finish with a brief discussion of design principles to resist this class of attack.
John Kelsey, Bruce Schneier, David Wagner
Added 08 Aug 2010
Updated 08 Aug 2010
Type Conference
Year 1997
Where SPW
Authors John Kelsey, Bruce Schneier, David Wagner
Comments (0)