Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

نویسندگان

  • David A. Basin
  • Cas J. F. Cremers
  • Simon Meier
چکیده

We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some that violate even the most basic authentication guarantees. We analyse the cause of these weaknesses, propose repaired versions of the protocols, and provide automated, machinechecked proofs of the correctness of the resulting protocols. From an engineering perspective, we propose two design principles for security protocols that suffice to prevent all the weaknesses. Moreover, we show how modern verification tools can be used for falsification and certified verification of security standards. The relevance of our findings and recommendations has been acknowledged by the responsible ISO working group and an updated version of the standard will be released.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably Repairing the ISO / IEC 9798 Standard for Entity

We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some that violate even the most basic authentication guarantees. We analyze the cause of these weaknesses, propose repaired versions of the protocols, and provide automated, machine-checked proofs of their correctness. From an engineeri...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A Study on Accuracy and Problems in using ISO/IEC 19794-2 Finger Minutiae Formats for Automated Fingerprint Verification

For the purpose of clarifying the problems in using ISO/IEC 19794-2 formats, the minutiae detection software MINDTCT and the fingerprint matching software BOZORTH3 included in NBIS were modified to accept the standardized fingerprint data. From experimental results, the EERs of authentication system using the ISO/IEC 19794-2 formats become slightly worse than that of the system using original X...

متن کامل

ISO MANA Certificates in Practice

The international standard ISO 9798-6 specifies MANA protocols for data authentication and an application of the MANA I protocol to public key authentication and key exchange. The resulting protocol is called the MANA certificate protocol an can be viewed as a passkey based key agreement protocol. In this paper we present an application of MANA certificate protocol to a wireless security associ...

متن کامل

A Derivation System for Security Protocols and its Logical Formalization

Many authentication and key exchange protocols are built using an accepted set of standard concepts such as Diffie-Hellman key exchange, nonces to avoid replay, certificates from an accepted authority, and encrypted or signed messages. We introduce a basic framework for deriving security protocols from such simple components. As a case study, we examine the structure of a family of key exchange...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Computer Security

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2012