The Dolev-Yao model is a formal model used to prove properties of interactive protocols.
Contents |
The network is represented by a set of abstract machines that can exchange messages. These messages consist of formal terms.
The adversary in this model can overhear, intercept, and synthesise any message and is only limited by the constraints of the cryptographic methods used. In other words: "the attacker carries the message."
This omnipotence has been very difficult to model and many threat models simplify it, as, for example, the attacker in ubiquitous computing.
Cryptographic primitives are modeled by abstract operators. For example, asymmetric encryption for a user is represented by the encryption function and the decryption function . Their main properties are that their composition is the identity function () and that an encrypted message reveals nothing about . Unlike in the real world, the adversary can neither manipulate the encryption's bit representation nor guess the key.