Injective synchronisation: An extension of the authentication hierarchy

نویسندگان

  • Cas J. F. Cremers
  • Sjouke Mauw
  • Erik P. de Vink
چکیده

Authentication is one of the foremost goals of many security protocols. It is most often formalised as a form of agreement, which expresses that the communicating partners agree on the values of a number of variables. In this paper we formalise and study an intensional form of authentication which we call synchronisation. Synchronisation expresses that the messages are transmitted exactly as prescribed by the protocol description. Synchronisation is a strictly stronger property than agreement for the standard intruder model, because it can be used to detect preplay attacks. In order to prevent replay attacks on simple protocols, we also define injective synchronisation. Given a synchronising protocol, we show that a sufficient syntactic criterion exists that guarantees that the protocol is injective as well.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deissler Rank Complexity of Powers of Indecomposable Injective Modules

Minimality ranks in the style of Deissler are one way of measuring the structural complexity of minimal extensions of first-order structures. In particular, positive Deissler rank measures the complexity of the injective envelope of a module as an extension of that module. In this paper we solve a problem of the second author by showing that certain injective envelopes have the maximum possible...

متن کامل

On component extensions locally compact abelian groups

Let $pounds$ be the category of locally compact abelian groups and $A,Cin pounds$. In this paper, we define component extensions of $A$ by $C$ and show that the set of all component extensions of $A$ by $C$ forms a subgroup of $Ext(C,A)$ whenever $A$ is a connected group. We establish conditions under which the component extensions split and determine LCA groups which are component projective. ...

متن کامل

Analysis of the Utility of Economic Sectors in Achieving Agricultural Development: Applying an Analytic Hierarchy Process

ABSTRACT- According to article 44 of the I.R. of Iran Constitution, the Iranian economy consists of three sectors; the state, the cooperative, and the private sectors. The aim of this study was to present a hierarchy of criteria for selecting the best economic sector for agricultural development. Analytic Hierarchy Process (AHP) was used to calculate the relative importance of either criteria o...

متن کامل

ON PROJECTIVE L- MODULES

The concepts of free modules, projective modules, injective modules and the likeform an important area in module theory. The notion of free fuzzy modules was introducedby Muganda as an extension of free modules in the fuzzy context. Zahedi and Ameriintroduced the concept of projective and injective L-modules. In this paper we give analternate definition for projective L-modules. We prove that e...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 367  شماره 

صفحات  -

تاریخ انتشار 2006