Information Services banner Edinburgh Research Archive The University of Edinburgh crest

Edinburgh Research Archive >
Informatics, School of >
Informatics Publications >

Please use this identifier to cite or link to this item:

This item has been viewed 8 times in the last year. View Statistics

Files in This Item:

File Description SizeFormat
BundyA_Attacking the Asokan.pdf93.76 kBAdobe PDFView/Open
Title: Attacking the Asokan-Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL
Authors: Steel, G.
Maidl, M.
Bundy, Alan
Issue Date: Oct-2003
Journal Title: Proceedings of 23rd IFIP International Conference on Formal Techniques for Networked and Distributed Systems
Abstract: We describe Coral, a counterexample finder for incorrect inductive conjectures. By devising a first-order version of Paulson's formalism for cryptographic protocol analysis, we are able to use Coral to attack protocols which may have an unbounded number of principals involved in a single run. We show two attacks we have found on the Asokan--Ginzboorg protocol for establishing a group key in an ad-hoc network of Bluetooth devices.
Appears in Collections:Informatics Publications

Items in ERA are protected by copyright, with all rights reserved, unless otherwise indicated.


Valid XHTML 1.0! Unless explicitly stated otherwise, all material is copyright © The University of Edinburgh 2013, and/or the original authors. Privacy and Cookies Policy