Web security: Authentication protocols and their analysis

被引:1
|
作者
Wen, W [1 ]
Mizoguchi, F [1 ]
机构
[1] Tokyo Univ Sci, Noda, Chiba 2788510, Japan
关键词
internet security; authentication protocol; security protocol analysis;
D O I
10.1007/BF03037600
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is one of the basic building blocks of computer security. It is achieved through the execution of an authentication protocol between two or more parties. One such protocol, the Secure Socket Layer (SSL) protocol, has become the de facto standard for Web security. This paper provides an overview of results and methods used in analyzing authentication protocols. The aim is to provide a bird's eye view of the assumptions, methods, and results that are available for anyone who is interested in designing new security protocols or applying a new analysis approach. A detailed description of the SSL handshake protocol as well as how changes in environment assumption can lead to unexpected consequences, is provided. A fix to the weakness is also described.
引用
收藏
页码:283 / 299
页数:17
相关论文
共 50 条
  • [1] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    [J]. New Generation Computing, 2001, 19 : 283 - 299
  • [2] Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols
    Wang, Kailong
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 : 441 - 445
  • [3] VANET authentication protocols: security analysis and a proposal
    Piramuthu, Otto B.
    Caesar, Matthew
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (02): : 2153 - 2179
  • [4] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [5] VANET authentication protocols: security analysis and a proposal
    Otto B. Piramuthu
    Matthew Caesar
    [J]. The Journal of Supercomputing, 2023, 79 : 2153 - 2179
  • [6] Security Analysis of ECC Based Authentication Protocols
    Khatwani, Chanchal
    Roy, Swapnoneel
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1167 - 1172
  • [7] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [8] Security Analysis and Improvement on Two RFID Authentication Protocols
    Shaohui Wang
    Sujuan Liu
    Danwei Chen
    [J]. Wireless Personal Communications, 2015, 82 : 21 - 33
  • [9] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
  • [10] Security Analysis and Improvement on Two RFID Authentication Protocols
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (01) : 21 - 33