Notes - Computer Security MT24, Dolev-Yao model
Flashcards
@Define the assumptions in the Dolev-Yao model, and summarise it succinctly..
The enemy in a network can:
- Eavesdrop on every message that passes through the network
- Intercept any message, masquerading as the intended receiver
- Impersonate any user/agent by sending messages in their name
- …and is also a legitimate user of the network, and can send messages under their own name.
“Assume that the enemy carries the messages.”
What’s the difference between authenticity and integrity in the Dolev-Yao model?
- Authentication: If Bob receives a message from Alice, he can be sure that Alice made the message.
- Integrity: If Bob receives a tampered message, he is aware that it has been tampered with.