Table 8. Identified insecure function behavior examples.
Identified insecure function behaviors of the example function “encrypt data by S’s public key”.
Function | GW: NECV | GW: ECV | GW: ETL |
---|---|---|---|
Phone_ Func1 | Phone_Func1_ IFB1 | Phone_Func1_IFB2, Phone_Func1_IFB3 | Phone_Func1_ IFB4 |
IFB Description: | |||
Phone_Func1: “encrypt data by S’s public key” function | |||
Phone_Func1_IFB1: Data is not encrypted, but the function is pretended to have been executed correctly [V-1/3] | |||
Phone_Func1_IFB2: Data is encrypted by a forged public key [V-1/3] | |||
Phone_Func1_IFB3: Data is encrypted with malicious algorithms [V-1/3] | |||
Phone_Func1_IFB4: Encryption process takes too long to violate the protocol time limits, which aborts the expected mission [V-2] |