RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

Prikl. Diskr. Mat., 2010 supplement № 3, Pages 65–66 (Mi pdm232)

Mathematical Foundations of Computer Security

Using Scyther for analysis SKID3 security

M. I. Tsoy

Tomsk State University

Abstract: Results of SKID3 protocol security analysis are provided in this paper. An attempt to find a man-in-the-middle attack on this protocol (mentioned by B. Schneier in his book) was made. For this purpose, the author used the Scyther tool created by Cas Cremers and came to the conclusion that SKID3 is rather invulnarable to the man-in-the-middle attack.

UDC: 004.056



© Steklov Math. Inst. of RAS, 2024