Skip to main content

2016 | OriginalPaper | Buchkapitel

Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols

verfasst von : Da Bao, Kazunori Wagatsuma, Hongbiao Gao, Jingde Cheng

Erschienen in: Advanced Multimedia and Ubiquitous Engineering

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Knowledge about attacks is a necessary foundation for security analysis of information systems or cryptographic protocols. Current security verification methods for improving the security of target systems or the soundness of cryptographic protocols has limitations because they are all based on the assumptions from known attacks, while the attackers are trying every possible attacks against the information systems. Once a new-style attack was found by adversaries earlier, it would bring severe loss to the target systems. Therefore, it is essential to understand and take measures against new attacks previously. A new method has been proposed for predicting new attacks, but it lacks experimental results to prove its effectiveness. This paper confirms the effectiveness of the proposed method by a rediscovery experiment that shows several known attacks on cryptographic protocols rediscovered successfully. The paper also shows issues of the approach for predicting new attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abadi M, Fournet C (2001) Mobile values, new names and secure communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on principles of programming languages, pp 104–115, ACM Abadi M, Fournet C (2001) Mobile values, new names and secure communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on principles of programming languages, pp 104–115, ACM
2.
Zurück zum Zitat Anderson RJ, Needham RM (1995) Programming Satan’s computer. In: van Leeuwen J (ed) Computer science today: recent trends and developments. LNCS, vol 1000. Springer, Heidelberg, pp 426–440 Anderson RJ, Needham RM (1995) Programming Satan’s computer. In: van Leeuwen J (ed) Computer science today: recent trends and developments. LNCS, vol 1000. Springer, Heidelberg, pp 426–440
3.
Zurück zum Zitat Bao D, Goto Y, Cheng J (2014) Predicting new attacks for information security. In: Park JJ et al. (eds) Computer science and its applications, ubiquitous information technologies. LNEE, vol 330. Springer, Heidelberg, pp 1353–1358
 Bao D, Goto Y, Cheng J (2014) Predicting new attacks for information security. In: Park JJ et al. (eds) Computer science and its applications, ubiquitous information technologies. LNEE, vol 330. Springer, Heidelberg, pp 1353–1358

4.
Zurück zum Zitat Bau J, Mitchell J (2011) Security modeling and analysis. IEEE Secur Priv 9(3):18–25CrossRef Bau J, Mitchell J (2011) Security modeling and analysis. IEEE Secur Priv 9(3):18–25CrossRef
5.
Zurück zum Zitat Boyd C, Mao W (1994) On a limitation of BAN logic. In: Helleseth T (ed) EUROCRYPT 1993. LNCS, vol 765. Springer, Heidelberg, pp 465–474 Boyd C, Mao W (1994) On a limitation of BAN logic. In: Helleseth T (ed) EUROCRYPT 1993. LNCS, vol 765. Springer, Heidelberg, pp 465–474
6.
Zurück zum Zitat Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer, Heidelberg
 Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer, Heidelberg

7.
Zurück zum Zitat Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36 Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36
8.
Zurück zum Zitat Cheng J (2006) Strong relevant logic as the universal basis of various applied logics for knowledge representation and reasoning. In: Kiyoki Y, Henno J, Jaakkola H, Kangassalo H (eds) Information modelling and knowledge bases XVII. Frontiers in artificial intelligence and applications, vol 136. IOS Press, Amsterdam, pp 310–320 Cheng J (2006) Strong relevant logic as the universal basis of various applied logics for knowledge representation and reasoning. In: Kiyoki Y, Henno J, Jaakkola H, Kangassalo H (eds) Information modelling and knowledge bases XVII. Frontiers in artificial intelligence and applications, vol 136. IOS Press, Amsterdam, pp 310–320
9.
Zurück zum Zitat Cheng J (2014) New challenges in future software engineering. In: Park JJ, Pan Y, Kim C, Yan Y (eds) Future information technology, FutureTech 2014. LNEE, vol 309. Springer, Berlin, pp 31–36 Cheng J (2014) New challenges in future software engineering. In: Park JJ, Pan Y, Kim C, Yan Y (eds) Future information technology, FutureTech 2014. LNEE, vol 309. Springer, Berlin, pp 31–36
10.
Zurück zum Zitat Cheng J, Miura J (2006) Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance. In: Proceedings of 1st international conference on availability, reliability and security, IEEE Computer Society, pp 601–608 Cheng J, Miura J (2006) Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance. In: Proceedings of 1st international conference on availability, reliability and security, IEEE Computer Society, pp 601–608
11.
Zurück zum Zitat Cheng J, Nara S, Goto Y (2007) FreeEnCal: a forward reasoning engine with general-purpose. In: Knowledge-based intelligent information and engineering systems, LNAI, vol 4693. Springer, Berlin, pp 444–452 Cheng J, Nara S, Goto Y (2007) FreeEnCal: a forward reasoning engine with general-purpose. In: Knowledge-based intelligent information and engineering systems, LNAI, vol 4693. Springer, Berlin, pp 444–452
12.
Zurück zum Zitat Clark J, Jacob J (1996) Attacking authentication protocols. High Integr Syst 1(5):465–473 Clark J, Jacob J (1996) Attacking authentication protocols. High Integr Syst 1(5):465–473
13.
Zurück zum Zitat Dolev D, Yao A (1983) On the security of public-key protocols. IEEE Trans Inf Theory 29:198–208 Dolev D, Yao A (1983) On the security of public-key protocols. IEEE Trans Inf Theory 29:198–208
14.
Zurück zum Zitat Otway D, Rees O (1987) Efficient and timely mutual authentication. Oper Syst Rev 21(1):8–10CrossRef Otway D, Rees O (1987) Efficient and timely mutual authentication. Oper Syst Rev 21(1):8–10CrossRef
15.
Zurück zum Zitat Wagatsuma K, Goto Y, Cheng J (2015) A formal analysis method with reasoning for key exchange protocols. J Inf Process Soc Jpn 56(3):903–910 (in Japanese) Wagatsuma K, Goto Y, Cheng J (2015) A formal analysis method with reasoning for key exchange protocols. J Inf Process Soc Jpn 56(3):903–910 (in Japanese)
Metadaten
Titel
Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols
verfasst von
Da Bao
Kazunori Wagatsuma
Hongbiao Gao
Jingde Cheng
Copyright-Jahr
2016
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-1536-6_35

Neuer Inhalt