Guessing Attacks in the pi-calculus with a Computational Justification. Draft Comments Welcome

نویسنده

  • Tom Chothia
چکیده

This paper presents an extension of the pi-calculus that can reason about brute force and guessing attacks. We relate new name declarations in the pi-calculus with random sampling in the computational model of security. The scope of a new name can then be expanded at a comparable cost as it would take to guess the randomly sampled value in the computational setting. We provide a syntax and reduction semantics for this system and a function that calculates the cost of a given attack, taking into account the ease with which the attacker can confirm their guesses. We argue the correctness of this calculus by relating it to the computational model of security. We show that if the cost of an attack in the calculus is less than exponential in a security parameter, then there exists a polynomial time Turing machine that can defeat the process with non-negligibility probability. On the other hand, if there is no sub-exponential cost attack, then the process is just as safe as its spi-calculus counterpart, and so the use of guessable names does not help the attacker.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Who Belongs in Managed Care? Using Premium Policy to Achieve an Efficient Assignment in Medicare

Abstract Acknowledgments: The authors are grateful to the National Institute of Aging for support through P01 XXXXX. The Role of Private Plans in Medicare, J. Newhouse, PI. This paper grew out of discussions with Rhema Vaithianathan. Mike Chernew, Richard Frank and Joe Newhouse provided helpful comments on an earlier draft. The opinions and conclusions in this paper are the authors’ alone. This...

متن کامل

A Calculus to Detect Guessing Attacks

We present a calculus for detecting guessing attacks, based on oracles that instantiate cryptographic functions. Adversaries can observe oracles, or control them either on-line or off-line. These relations can be established by protocol analysis in the presence of a Dolev-Yao intruder, and the derived guessing rules can be used together with standard intruder deductions. Our rules also handle p...

متن کامل

A computational justification for guessing attack formalisms

Recently attempts have been made to extend the Dolev-Yao security model by allowing an intruder to learn weak secrets, such as poorly-chosen passwords, by off-line guessing. In such an attack, the intruder is able to verify a guessed value g if he can use it to produce a value called a verifier. In such a case we say that g is verifier-producing. The definition was formed by inspection of known...

متن کامل

Biometrics based authentication scheme for session initiation protocol

Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed ...

متن کامل

Analysing Protocol Subject to Guessing Attacks

In this paper we consider guessing attacks upon security protocols, where an intruder guesses one of the values used (typically a poorly-chosen password) and then seeks to verify that guess. We formalise such attacks, and in particular the way in which the guess is verified. We then describe how to model such attacks within the process algebra CSP, so that they can be detected using the model c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005