A Syntactic Criterion for Injectivity of Authentication Protocols
نویسندگان
چکیده
Injectivity is essential when studying the correctness of authentication protocols, because non-injective protocols may suffer from replay attacks. The standard ways of verifying injectivity either make use of a counting argument, which only seems to be applicable in a verification methodology based on model-checking, or draw conclusions on the basis of the details of the data-model used. We propose and study a property, the loop property, that can be syntactically verified and is sufficient to guarantee injectivity. Our result is generic in the sense that it holds for a wide range of security protocol models, and does not depend on the details of message contents or nonce freshness.
منابع مشابه
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملOn Baer type criterion for $C$-dense, $C$-closed and quasi injectivity
For the subclasses $mathcal{M}_1$ and $mathcal{M}_2$ of monomorphisms in a concrete category $mathcal{C}$, if $mathcal{M}_2subseteq mathcal{M}_1$, then $mathcal{M}_1$-injectivity implies $mathcal{M}_2$-injectivity. The Baer type criterion is about the converse of this fact. In this paper, we apply injectivity to the classes of $C$-dense, $C$-closed monomorphisms. The con...
متن کاملOrder dense injectivity of $S$-posets
In this paper, the notion of injectivity with respect to order dense embeddings in the category of $S$-posets, posets with a monotone action of a pomonoid $S$ on them, is studied. We give a criterion, like the Baer condition for injectivity of modules, or Skornjakov criterion for injectivity of $S$-sets, for the order dense injectivity. Also, we consider such injectivit...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electr. Notes Theor. Comput. Sci.
دوره 135 شماره
صفحات -
تاریخ انتشار 2005