Web security: Authentication protocols and their analysis

被引:1
|
作者
Wen, W [1 ]
Mizoguchi, F [1 ]
机构
[1] Tokyo Univ Sci, Noda, Chiba 2788510, Japan
关键词
internet security; authentication protocol; security protocol analysis;
D O I
10.1007/BF03037600
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is one of the basic building blocks of computer security. It is achieved through the execution of an authentication protocol between two or more parties. One such protocol, the Secure Socket Layer (SSL) protocol, has become the de facto standard for Web security. This paper provides an overview of results and methods used in analyzing authentication protocols. The aim is to provide a bird's eye view of the assumptions, methods, and results that are available for anyone who is interested in designing new security protocols or applying a new analysis approach. A detailed description of the SSL handshake protocol as well as how changes in environment assumption can lead to unexpected consequences, is provided. A fix to the weakness is also described.
引用
下载
收藏
页码:283 / 299
页数:17
相关论文
共 50 条
  • [21] Security analysis of two anonymous authentication protocols for distributed wireless networks
    Wong, DS
    Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 284 - 288
  • [22] Security analysis of two ultra-lightweight RFID authentication protocols
    Li, Tieyan
    Wang, Guilin
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
  • [23] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
    Barbosa, Manuel
    Farshim, Pooya
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253
  • [24] Limitations of Authentication Test in the Analysis of Multi-party Security Protocols
    Wei-tao, Song
    Bin, Hu
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2243 - 2247
  • [25] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [26] Modelling and checking timed authentication of security protocols
    Jakubowska, Gizela
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2007, 79 (3-4) : 363 - 378
  • [27] Security Issues in Ultralightweight RFID Authentication Protocols
    Zhuang, Xu
    Zhu, Yan
    Chang, Chin-Chen
    Peng, Qiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 779 - 814
  • [28] Security Issues in Ultralightweight RFID Authentication Protocols
    Xu Zhuang
    Yan Zhu
    Chin-Chen Chang
    Qiang Peng
    Wireless Personal Communications, 2018, 98 : 779 - 814
  • [29] Scalability and Security Conflict for RFID Authentication Protocols
    Erguler, Imran
    Anarim, Emin
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 59 (01) : 43 - 56
  • [30] More on the Security of Linear RFID Authentication Protocols
    Krause, Matthias
    Stegemann, Dirk
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 182 - 196