Cryptographic protocols are often specified by narrations, i.e., finite sequences of message exchanges that show the intended execution of the protocol. Another use of narrations is to describe attacks. We propose in this paper to compile, when possible, attack describing narrations into a set of tests that honest participants can perform to exclude these executions. These tests can be implemented in monitors to protect existing implementations from rogue behaviour.
翻译:密码协议通常通过解说来指定,即显示协议预定执行的通信交换的有限顺序。另一个用词是描述攻击。我们在本文件中提议,在可能情况下,将攻击描述为诚实的参与者可以进行的一系列测试,以排除这些处决。这些测试可以在监视器中进行,以保护现有的执行不受流氓行为的影响。