Academia.eduAcademia.edu

On the perfect encryption assumption

2000, Workshop on Information Technologies and Systems

AI-generated Abstract

This work critiques the common assumption of perfect encryption in security protocols, highlighting its impracticality through examples like cipher-block chaining (CBC). It examines the vulnerabilities in the Needham-Schroeder protocol, demonstrating how attackers can exploit encryption flaws. A new model is proposed that introduces small factors into the encryption process, mitigating the outlined attacks. The model is specified in Promela and tested against the Needham-Schroeder-Lowe protocol, successfully identifying potential attacks within seconds.