Protocol misidentification made easy with format-transforming encryption.
Kevin P. DyerScott E. CoullThomas RistenpartThomas ShrimptonPublished in: CCS (2013)
Keyphrases
- cryptographic protocols
- security properties
- mutual authentication
- key exchange
- cryptographic algorithms
- security analysis
- metadata
- virtual private network
- databases
- security protocols
- authentication protocol
- communication protocol
- formal analysis
- encryption decryption
- network protocols
- provably secure
- wireless sensor networks
- petri net
- lightweight
- sensor networks
- application layer
- information hiding
- security model
- database systems
- multimedia
- encryption algorithms
- protocol specification
- smart card