Notes - Computer Security MT24, Dolev-Yao model


Flashcards

@Define the assumptions in the Dolev-Yao model, and summarise it succinctly..


The enemy in a network can:

  1. Eavesdrop on every message that passes through the network
  2. Intercept any message, masquerading as the intended receiver
  3. Impersonate any user/agent by sending messages in their name
  4. …and is also a legitimate user of the network, and can send messages under their own name.

“Assume that the enemy carries the messages.”

What’s the difference between authenticity and integrity in the Dolev-Yao model?


  • Authentication: If Bob receives a message from Alice, he can be sure that Alice made the message.
  • Integrity: If Bob receives a tampered message, he is aware that it has been tampered with.



Related posts