Classiication of Cryptographic Techniques in Authentication Protocols
نویسندگان
چکیده
In many published authentication protocols, the cryptographic services are coarsely speciied in that, whenever needed, a uniform notation is used to denote them while the exact nature of protection required is left unclear. In this paper we reason that such a coarse treatment not only forms a foundation why authentication protocols are error prone, but is also responsible for a typical feature of misusing redundancy which causes many protocols to be unnecessarily weak. We propose new notations to reene protocol speciications. The reenement leads to a methodology for the development of secure and strong authentication protocols.
منابع مشابه
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملSystematic 0esign of a Family of Attack-Resistant Authentication Protocols
The extensive use of open networks and distributed systems poses serious threats to the security of end-to-end communications and network components themselves. A necessary foundation for securing a network is the ability to reliably authenticate communication partners and other network entities. ne-way, password-based authentication techniques are not sufficient to cope with the issues at han...
متن کاملSecurity Proofs for Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
This paper investigates security proofs for protocols that employ asymmetric (public-key) techniques to solve two problems: entity authentication and authenticated key transport. We provide a formal model, and supply a deenition of the goals within this model. We prove our protocols correct within this framework, given the existence of certain cryptographic primitives. The practical implementat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007