Abstract
Many commercially available security products depend crucially on the use of cryptographic algorithms. Obviously, if the underlying cryptosystem is broken, the intention of the systems designer can be subverted. However, for detecting security leaks in communication software, it is not sufficient to evaluate the cryptographic algorithms used. It is often neglected in protocol design that a system might be broken entirely without eroding the security of the underlying algorithm [ 102]. In that case, one speaks of a protocol attack. In other scenarios, attackers exploit faulty implementations; in this case one speaks of an implementation attack.
Detection is, or ought to be, an exact sciences and should be treated in the same cold and unemotional manner. You have attempted to tinge it with romanticism, which produces much the same effect as if you worked a love storyoran elopement into thefifth proposition of Euclid.—Sir Arthur Conan Doyle
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer Science+Business Media New York
About this chapter
Cite this chapter
Katzenbeisser, S. (2001). Protocol and Implementation Attacks. In: Recent Advances in RSA Cryptography. Advances in Information Security, vol 3. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1431-2_7
Download citation
DOI: https://doi.org/10.1007/978-1-4615-1431-2_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-5550-2
Online ISBN: 978-1-4615-1431-2
eBook Packages: Springer Book Archive