RFC 6813 NEA Asokan Attack Analysis
نویسنده
چکیده
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
منابع مشابه
PA-TNC: A Posture Attribute (PA) Protocol Compatible with Trusted Network Connect (TNC)
This document specifies PA-TNC, a Posture Attribute protocol identical to the Trusted Computing Group’s IF-M 1.0 protocol. The document then evaluates PA-TNC against the requirements defined in the NEA Requirements specification.
متن کاملA Posture Transport Protocol over TLS (PT-TLS)
This document specifies PT-TLS, a TLS-based Posture Transport (PT) protocol. The PT-TLS protocol carries the Network Endpoint Assessment (NEA) message exchange under the protection of a Transport Layer Security (TLS) secured tunnel.
متن کاملDigital Watermarking with a New Algorithm
Everyday millions of data need to transmit through a distinct channel for various purposes; as a result there is a certain chance of third person interruption on that data. In this regards digital watermarking is one of the best solution. This paper proposes a new embedding algorithm (NEA) of digital watermarking. The algorithm is performed for digital image as data. The performance is compared...
متن کاملAttacking the Asokan–Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL
We describe CORAL, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson’s formalism for cryptographic protocol analysis, [10], we are able to use CORAL to attack protocols which may have an unbounded number of principals involved in a single run. We show two new attacks CORAL has found on the Asokan–Ginzboorg protocol for establishing a group...
متن کاملAnalysis of a Fair Exchange Protocol
We analyze an optimistic contract signing protocol of Asokan, Shoup, and Waidner as a case study in the applicability of formal methods to verification of fair exchange protocols. After discussing the challenges involved in formalizing fairness, we use Mur , a finitestate analysis tool, to discover a weakness in the protocol that enables a malicious participant to produce inconsistent versions ...
متن کامل