Dolev-Yao model

Dolev-Yao model

The Dolev-Yao model is a formal model used to prove properties of interactive protocols.

Contents

The network

The network is represented by a set of abstract machines that can exchange messages. These messages consist of formal terms.

The adversary



The image above is proposed for deletion. See files for deletion to help reach a consensus on what to do.

The adversary in this model can overhear, intercept, and synthesise any message and is only limited by the constraints of the cryptographic methods used. In other words: "the attacker carries the message."

This omnipotence has been very difficult to model and many threat models simplify it, as, for example, the attacker in ubiquitous computing.

The algebraic model

Cryptographic primitives are modeled by abstract operators. For example, asymmetric encryption for a user x is represented by the encryption function Ex and the decryption function Dx. Their main properties are that their composition is the identity function (DxEx = ExDx = 1) and that an encrypted message Ex(M) reveals nothing about M. Unlike in the real world, the adversary can neither manipulate the encryption's bit representation nor guess the key.

See also

References



Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Dolev-Yao threat model — The Dolev Yao model represents an attacker that can overhear, intercept, and synthesise any message and is only limited by the constraints of the cryptographic methods used. In other words: the attacker carries the message. This omnipotence has… …   Wikipedia

  • Dolev-Yao-Modell — Das Dolev Yao Modell ist ein von Danny Dolev und Andrew Yao vorgeschlagenes formales Modell, in dem interaktive Protokolle beschrieben werden können. Ein solches Modell wird benötigt, um formale Aussagen über solche Protokolle zu treffen. Um das… …   Deutsch Wikipedia

  • Cryptographic protocol — A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security related function and applies cryptographic methods. A protocol describes how the algorithms should be used. A… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”