On the power of non-spoofing adversaries

  • Authors:
  • H. B. Acharya;Mohamed Gouda

  • Affiliations:
  • Department of Computer Science, University of Texas at Austin;Department of Computer Science, University of Texas at Austin and National Science Foundation

  • Venue:
  • DISC'10 Proceedings of the 24th international conference on Distributed computing
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

One of the fundamental concepts in network security is the active adversary. Such an adversary is defined, in the classic paper by Dolev and Yao, as an adversary that (in addition to eavesdropping passively), can "impersonate another user and ... alter or replay the message". Thus, the original definition of an active adversary includes the ability to spoof (lie about its identity). In this paper, we study the special case of active adversaries who are restricted from spoofing. As in the original study by Dolev and Yao, the motivation of our adversary is to break the confidentiality of the message being transmitted using a cascade protocol (a protocol in which neither sender nor receiver name stamps the messages they send). We prove a very surprising result: our weaker adversary, who is restricted from spoofing, is in fact exactly as powerful as the unrestricted Dolev-Yao adversary with respect to the goal of breaking confidentiality of cascade protocols.