|
Prikladnaya Diskretnaya Matematika, 2010, supplement № 3, Pages 65–66
(Mi pdm232)
|
|
|
|
Mathematical Foundations of Computer Security
Using Scyther for analysis SKID3 security
M. I. Tsoy Tomsk State University
Abstract:
Results of SKID3 protocol security analysis are provided in this paper. An attempt to find a man-in-the-middle attack on this protocol (mentioned by B. Schneier in his book) was made. For this purpose, the author used the Scyther tool created by Cas Cremers and came to the conclusion that SKID3 is rather invulnarable to the man-in-the-middle attack.
Citation:
M. I. Tsoy, “Using Scyther for analysis SKID3 security”, Prikl. Diskr. Mat., 2010, supplement № 3, 65–66
Linking options:
https://www.mathnet.ru/eng/pdm232 https://www.mathnet.ru/eng/pdm/y2010/i12/p65
|
Statistics & downloads: |
Abstract page: | 496 | Full-text PDF : | 151 | References: | 78 |
|