Abstract
Generally, a piece of information (key, password, etc.) is classified as secret when it gives to its owner some privileges or protections. For instance, cryptographic keys can be used for several purposes such as to prove our identity (authentication), to keep our anonymity, to protect our data against malicious manipulation, etc. The secrecy property within cryptographic protocols is generally defined as follows : A given protocol P keeps a message M (M can be a key) secret, if an intruder will not be able to reveal the value of M during any execution of this protocol.
In this paper, we prove that some cryptographic protocols can involve the following amazing situation: the intruder can never discover the value of a given key k but he is able to both encrypt and decrypt any message using this key k. We baptize this kind of awful cryptographic protocols by chaotic protocols. This fact has been discovered when analyzing the one-way Woo and Lam authentication protocol using the Dymna approach which is specially developed for the verification of cryptographic protocols. Abadi and Needham present an attack against this protocol and proposed a new corrected version . Surprisingly, we prove in this paper that the new proposed version is also a chaotic protocol. Finally, some interesting features of chaotic protocols are discussed in this paper.
This research is supported by a research grant from the Natural Sciences and Engineering Council of Canada, NSERC, the ”Fonds Qébécois de la Recherche sur la Nature et les Technologies”, FQRNT, and ”Commission Permanente de Coopération Franco-Québécoise”, CPCFQ.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. Technical report, SRC DIGITAL (June 1994)
Buttyan, L.: Formal methods in the design of cryptographic protocols (state of the art). Technical Report No. SSC/1999/38, Swiss Federal Institute ofTechnology (EPFL), Lausanne (November 1999)
Carlsen, U.: Formal Specification and Analysis of Cryptographic Protocols. PhD thesis, Thèse d’Informatique soutenue à l’Université PARIS XI (October 1994)
Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature, Unpublished Article Available at http://dcpu1.cs.york.ac.uk/~jeremy (August 1996)
Debbabi, M., Mejri, M., Tawbi, N., Yahmadi, I.: A New Algorithm for Automatic Verification of Authentication Cryptographic Protocols. In: Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, DIMACS Center, Core Building, Rutgers University, New Jersy, USA (September 1997)
Debbabi, M., Mejri, M., Tawbi, N., Yahmadi, I.: Formal AutomaticVerification of Authentication Cryptographic Protocols. In: Proceedings of the First IEEE International Conference on Formal Engineering Methods, Hiroshima, International Convention Center, Japan. IEEE Press, Los Alamitos (November 1997)
Debbabi, M., Mejri, M., Tawbi, N., Yahmadi, I.: From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. In: Proceedings of the Second InternationalWorkshop on Enterprise Security, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA, June 1997, IEEE Press, Los Alamitos (1997)
Kemmerer, R., Meadows, C., Millen, J.: Three Systems for Cryptographic Protocol Analysis. Journal of Cryptology 7(2), 79–130 (1994)
Liebl, A.: Authentication in Distributed Systems:A Bibliography. Operating Systems Review 27(4), 122–136 (1993)
Meadows, C.: Formal Verification of Cryptographic Protocols: A Survey. In: Proceedings of Asiacrypt 1996 (1996)
Rubin, A.D., Honeyman, P.: Formal Methods for the Analysis of Authentication Protocols. Technical ReportTechnical report 93–7,Technical Report, Center for InformationTechnology Integration (1993), University of Michigan. Internal Draft
Syverson, P.: Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. Journal of Computer Security 1(3), 317–334 (1992)
Woo, T.Y.C., Lam, S.S.: Authentication for Distributed Systems. Computer 25(1), 39–52 (1992)
Woo, T.Y.C., Lam, S.S.: A Lesson on Authentication Protocol Design. Operating Systems Review, 24–37 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mejri, M. (2004). Chaotic Protocols. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_106
Download citation
DOI: https://doi.org/10.1007/978-3-540-24707-4_106
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22054-1
Online ISBN: 978-3-540-24707-4
eBook Packages: Springer Book Archive