A Syntactic Criterion for Injectivity of Authentication Protocols

نویسندگان

  • Cas J. F. Cremers
  • Sjouke Mauw
  • Erik P. de Vink
چکیده

Injectivity is essential when studying the correctness of authentication protocols, because non-injective protocols may suffer from replay attacks. The standard ways of verifying injectivity either make use of a counting argument, which only seems to be applicable in a verification methodology based on model-checking, or draw conclusions on the basis of the details of the data-model used. We propose and study a property, the loop property, that can be syntactically verified and is sufficient to guarantee injectivity. Our result is generic in the sense that it holds for a wide range of security protocol models, and does not depend on the details of message contents or nonce freshness.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

On Baer type criterion for $C$-dense‎, ‎$C$-closed and quasi injectivity

‎For the subclasses $mathcal{M}_1$ and $mathcal{M}_2$ of‎ ‎monomorphisms in a concrete category $mathcal{C}$‎, ‎if $mathcal‎{M}_2subseteq mathcal{M}_1$‎, ‎then $mathcal{M}_1$-injectivity‎ ‎implies $mathcal{M}_2$-injectivity‎. ‎The Baer type criterion is about‎ ‎the converse of this fact‎. ‎In this paper‎, ‎we apply injectivity to the classes of $C$-dense‎, ‎$C$-closed‎ ‎monomorphisms‎. ‎The con...

متن کامل

Order dense injectivity of $S$-posets

‎‎‎In this paper‎, ‎the‎ notion of injectivity with respect to order dense embeddings in ‎‎the category of $S$-posets‎, ‎posets with a monotone action of a‎ pomonoid $S$ on them‎, ‎is studied‎. ‎We give a criterion‎, ‎like the Baer condition for injectivity of modules‎, ‎or Skornjakov criterion for injectivity of $S$-sets‎, ‎for the order dense injectivity‎. ‎Also‎, ‎we consider such injectivit...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electr. Notes Theor. Comput. Sci.

دوره 135  شماره 

صفحات  -

تاریخ انتشار 2005