Skip to main content
. 2021 Feb 3;7:e362. doi: 10.7717/peerj-cs.362

Table 8. Identified insecure function behavior examples.

Identified insecure function behaviors of the example function “encrypt data by S’s public key”.

Function GW: NECV GW: ECV GW: ETL
Phone_ Func1 Phone_Func1_ IFB1 Phone_Func1_IFB2, Phone_Func1_IFB3 Phone_Func1_ IFB4
IFB Description:
Phone_Func1: “encrypt data by S’s public key” function
Phone_Func1_IFB1: Data is not encrypted, but the function is pretended to have been executed correctly [V-1/3]
Phone_Func1_IFB2: Data is encrypted by a forged public key [V-1/3]
Phone_Func1_IFB3: Data is encrypted with malicious algorithms [V-1/3]
Phone_Func1_IFB4: Encryption process takes too long to violate the protocol time limits, which aborts the expected mission [V-2]