Protocol Variants and Electronic Identification

Provided by: International Association for Cryptologic Research
Topic: Security
Format: PDF
It is important to be able to evaluate information security systems involving humans. The authors propose an approach in which they consider the system as a cryptographic protocol, and users are modeled as ordinary players. To model the fact that users make mistakes that affect security, they introduce protocol variants that model mistakes or combinations of mistakes. By analyzing the base protocol and its variants, and at the same time considering how likely each variant is, they get a reasonable estimate of the real security of the system.

Find By Topic