Injective synchronisation: An extension of the authentication hierarchy
نویسندگان
چکیده
Authentication is one of the foremost goals of many security protocols. It is most often formalised as a form of agreement, which expresses that the communicating partners agree on the values of a number of variables. In this paper we formalise and study an intensional form of authentication which we call synchronisation. Synchronisation expresses that the messages are transmitted exactly as prescribed by the protocol description. Synchronisation is a strictly stronger property than agreement for the standard intruder model, because it can be used to detect preplay attacks. In order to prevent replay attacks on simple protocols, we also define injective synchronisation. Given a synchronising protocol, we show that a sufficient syntactic criterion exists that guarantees that the protocol is injective as well.
منابع مشابه
Deissler Rank Complexity of Powers of Indecomposable Injective Modules
Minimality ranks in the style of Deissler are one way of measuring the structural complexity of minimal extensions of first-order structures. In particular, positive Deissler rank measures the complexity of the injective envelope of a module as an extension of that module. In this paper we solve a problem of the second author by showing that certain injective envelopes have the maximum possible...
متن کاملOn component extensions locally compact abelian groups
Let $pounds$ be the category of locally compact abelian groups and $A,Cin pounds$. In this paper, we define component extensions of $A$ by $C$ and show that the set of all component extensions of $A$ by $C$ forms a subgroup of $Ext(C,A)$ whenever $A$ is a connected group. We establish conditions under which the component extensions split and determine LCA groups which are component projective. ...
متن کاملAnalysis of the Utility of Economic Sectors in Achieving Agricultural Development: Applying an Analytic Hierarchy Process
ABSTRACT- According to article 44 of the I.R. of Iran Constitution, the Iranian economy consists of three sectors; the state, the cooperative, and the private sectors. The aim of this study was to present a hierarchy of criteria for selecting the best economic sector for agricultural development. Analytic Hierarchy Process (AHP) was used to calculate the relative importance of either criteria o...
متن کاملON PROJECTIVE L- MODULES
The concepts of free modules, projective modules, injective modules and the likeform an important area in module theory. The notion of free fuzzy modules was introducedby Muganda as an extension of free modules in the fuzzy context. Zahedi and Ameriintroduced the concept of projective and injective L-modules. In this paper we give analternate definition for projective L-modules. We prove that e...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Theor. Comput. Sci.
دوره 367 شماره
صفحات -
تاریخ انتشار 2006