5. TA4SP
Before describing further the method used in TA4SP, it should be noted that if we do not limit the number of sessions of a protocol that can run in parallel, it is undecidable whether this protocol is sensitive to man-in-the-middle attacks, i.e. it is not possible to create a program that takes as input the description of a security protocol and gives an analysis of this protocol each time. To get back to a decidable case, i.e. one that can be implemented by a machine every time, it is necessary to make certain restrictions or assumptions. The most common is to limit the number of protocol sessions that can run in parallel, usually to two or three. This is justified a posteriori by the fact that almost all known protocol flaws use only two sessions (or very rarely three). Even with these assumptions, the problem is more complex than it seems and requires the development of dedicated algorithms....
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Networks and Telecommunications
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
TA4SP
Bibliography
References
- (1) - MANICORE (J.-M.) - Bénéfices environnementaux envisageables liés à l'introduction du télétravail - . Ministère de l'Industrie (2001). http://www.manicore.com/documentation/teletravail/OSI_synthese.html ...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference