@article{Adão20063, title = "Towards a Quantitative Analysis of Security Protocols", journal = "Electronic Notes in Theoretical Computer Science", volume = "164", number = "3", pages = "3 - 25", year = "2006", note = "Proceedings of the 4th International Workshop on Quantitative Aspects of Programming Languages (QAPL 2006) Quantitative Aspects of Programming Languages 2006", issn = "1571-0661", doi = "10.1016/j.entcs.2006.07.009", url = "http://www.sciencedirect.com/science/article/pii/S1571066106004889", author = "Pedro Adão and Paulo Mateus and Tiago Reis and Luca Viganò", keywords = "Security protocols", keywords = "Dolev-Yao intruder", keywords = "probabilistic intruder", keywords = "symbolic protocol analysis", keywords = "computational protocol analysis", abstract = "This paper contributes to further closing the gap between formal analysis and concrete implementations of security protocols by introducing a quantitative extension of the usual Dolev-Yao intruder model. This extended model provides a basis for considering protocol attacks that are possible when the intruder has a reasonable amount of computational power, in particular when he is able, with a certain probability, to guess encryption keys or other particular kind of data such as the body of a hashed message. We also show that these extensions do not augment the computational complexity of the protocol insecurity problem in the case of a finite number of interleaved protocol sessions." }