Classiication of Cryptographic Techniques in Authentication Protocols

نویسندگان

  • Wenbo Mao
  • Colin Boyd
چکیده

In many published authentication protocols, the cryptographic services are coarsely speciied in that, whenever needed, a uniform notation is used to denote them while the exact nature of protection required is left unclear. In this paper we reason that such a coarse treatment not only forms a foundation why authentication protocols are error prone, but is also responsible for a typical feature of misusing redundancy which causes many protocols to be unnecessarily weak. We propose new notations to reene protocol speciications. The reenement leads to a methodology for the development of secure and strong authentication protocols.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Systematic 0esign of a Family of Attack-Resistant Authentication Protocols

The extensive use of open networks and distributed systems poses serious threats to the security of end-to-end communications and network components themselves. A necessary foundation for securing a network is the ability to reliably authenticate communication partners and other network entities. Žne-way, password-based authentication techniques are not sufficient to cope with the issues at han...

متن کامل

Security Proofs for Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques

This paper investigates security proofs for protocols that employ asymmetric (public-key) techniques to solve two problems: entity authentication and authenticated key transport. We provide a formal model, and supply a deenition of the goals within this model. We prove our protocols correct within this framework, given the existence of certain cryptographic primitives. The practical implementat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007