Breaking and fixing the Helsinki protocol using SMV

被引:1
|
作者
Zhang, YQ [1 ]
Xiao, GZ [1 ]
机构
[1] Xidian Univ, Inst Informat Secur, Xian 710071, Peoples R China
关键词
D O I
10.1049/el:19990836
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An analysis is made of the Helsinki protocol using SMV, a model checker. The results show that the Horng-Hsu attack is the only successful attack on the protocol, and a new modified Helsinki protocol is proposed which is immune to the attack and better than the previous revised Helsinki protocol.
引用
收藏
页码:1239 / 1240
页数:2
相关论文
共 50 条
  • [1] Breaking and Fixing the HB plus DB protocol
    Boureanu, Ioana
    Gerault, David
    Lafourcade, Pascal
    Onete, Cristina
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 241 - 246
  • [2] Verification of protocol design using UML - SMV
    Prashanth, C.M.
    Chandrashekar Shet, K.
    World Academy of Science, Engineering and Technology, 2009, 36 : 544 - 548
  • [3] Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    Lowe, G
    SOFTWARE-CONCEPTS AND TOOLS, 1996, 17 (03): : 93 - 102
  • [4] Using SMV for cryptographic protocol analysis: A case study
    Zhang, Yuqing
    Wang, Chunling
    Wu, Jianping
    Li, Xing
    Operating Systems Review (ACM), 2001, 35 (02): : 43 - 50
  • [5] Using SMV for cryptographic protocol analysis: A case study
    Zhang, YQ
    Wang, CL
    Wei, SM
    FCS '05: Proceedings of the 2005 International Conference on Foundations of Computer Science, 2005, : 150 - 153
  • [6] Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol
    Debant, Alexandre
    Hirschi, Lucca
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6737 - 6752
  • [7] Breaking and Fixing Vote Privacy of the Estonian E-Voting Protocol IVXV
    Muller, Johannes
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2022 INTERNATIONAL WORKSHOPS, 2023, 13412 : 325 - 334
  • [8] Weakness in the Helsinki protocol
    Horng, G
    Hsu, CK
    ELECTRONICS LETTERS, 1998, 34 (04) : 354 - 355
  • [9] Securing HeterogeneousWireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol
    Aghili, Seyed Farhad
    Mala, Hamid
    Peris-Lopez, Pedro
    SENSORS, 2018, 18 (11)
  • [10] Automated verification of a randomized distributed consensus protocol using cadence SMV and PRISM
    Kwiatkowska, M
    Norman, G
    Segala, R
    COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2001, 2102 : 194 - 206