Completeness of the Authentication Tests
نویسندگان
چکیده
The shapes of a cryptographic protocol are its minimal, essentially different executions. In previous work, we have described a search algorithm to discover the shapes of a protocol, and implemented the algorithm in a Cryptographic Protocol Shape Analyzer cpsa. In this paper, we show its completeness, i.e. that every shape can in fact be found in a finite number of steps. The steps in question are applications of two authentication tests, fundamental protocol patterns for analysis and heuristics for protocol design. We formulate the authentication tests in a new, stronger form, for which completeness is true. We also introduce skeletons, as partial descriptions of executions. The information-preserving maps between skeletons are a kind of homomorphism. The completeness result shows that any homomorphism from a skeleton to a full execution may be digested into a sequence of atomic steps leading to a
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملA Solution for the Allocation of Customers Authentication Methods (The Case of Multimedia Contact Center in Agriculture Bank of Iran)
In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کامل