Some new attacks upon security protocols

  • Authors:
  • G. Lowe

  • Affiliations:
  • -

  • Venue:
  • CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many security protocols have appeared in the literature, with aims such as agreeing upon a cryptographic key, or achieving authentication. However, many of these have been shown to be flawed. In this paper we present a number of new attacks upon security protocols, and discuss ways in which we may avoid designing incorrect protocols in the future.