Attack and revison of an electronic auction protocol using OFMC

نویسندگان

  • Bogdan Ksiezopolski
  • Pascal Lafourcade
چکیده

In the article we show an attack on the cryptographic protocol of electronic auction with extended requirements [1]. The found attack consists of authentication breach and secret retrieval. It is a kind of “man in the middle attack”. The intruder impersonates an agent and learns some secret information. We have discovered this flaw using OFMC an automatic tool of cryptographic protocol verification. After a description of this attack, we propose a new version of the e-auction protocol. We also check with OFMC the secrecy for the new protocol and give an informal proof of the other properties that this new e-auction protocol has to guarantee.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provable Electronic Marketplace Bidding Auction Protocol with Bid Privacy

In this paper, we proposed a provable electronic marketplace bidding auction protocol. The proposed protocol tries to reduce DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. It utilizes efficient LPN-based authentication method to accomplish lightweight authentication. And it publishes an interpolating polynomial for sharing the data o...

متن کامل

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

Secure Receipt-Free Sealed-Bid Electronic Auction

The auction scheme that provides receipt-freeness, prevents the bidders from bid-rigging by the coercers. Bid-rigging is a dangerous attack in electronic auction. This happen if the bidder gets a receipt of his bidding price, which proves his bidding prices, from the auction protocol. The coercers used to force the bidders to disclose their receipts and hence bidders lose the secrecy of their b...

متن کامل

An Anonymous Auction Protocol Based on GDH Assumption

The popularization and conveniences of Internet have changed traditional auction transactions into electronic auction via Internet. In 2006, Chang and Chang proposed an anonymous auction that enabled bidders to bid in anonymous cases without any bonds. However, in the initiation phase, the bidder is unable to be anonymous as there is no mechanism to protect his (her) identity. Therefore, the la...

متن کامل

B2B electronic market analysis using game theory

In the explosive growth of Business to Business (B2B) Electronic Trades, electronic markets have received a great deal of attention recently. The obtained profit of trading in E-B2B market encourage market participants to remain in the market. Market participants consist of: sellers, buyers, and market owner. In this paper the expected profit function for each market participant has been define...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Annales UMCS, Informatica

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2007