Web security: Authentication protocols and their analysis

被引:1
|
作者
Wen, W [1 ]
Mizoguchi, F [1 ]
机构
[1] Tokyo Univ Sci, Noda, Chiba 2788510, Japan
关键词
internet security; authentication protocol; security protocol analysis;
D O I
10.1007/BF03037600
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is one of the basic building blocks of computer security. It is achieved through the execution of an authentication protocol between two or more parties. One such protocol, the Secure Socket Layer (SSL) protocol, has become the de facto standard for Web security. This paper provides an overview of results and methods used in analyzing authentication protocols. The aim is to provide a bird's eye view of the assumptions, methods, and results that are available for anyone who is interested in designing new security protocols or applying a new analysis approach. A detailed description of the SSL handshake protocol as well as how changes in environment assumption can lead to unexpected consequences, is provided. A fix to the weakness is also described.
引用
收藏
页码:283 / 299
页数:17
相关论文
共 50 条
  • [41] Security Enhanced RFID Authentication Protocols for Healthcare Environment
    Shaohao Xie
    Fangguo Zhang
    Rong Cheng
    Wireless Personal Communications, 2021, 117 : 71 - 86
  • [42] Using Automated Model Analysis for Reasoning about Security of Web Protocols
    Kumar, Apurva
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 289 - 298
  • [43] A machine learning-based scheme for the security analysis of authentication and key agreement protocols
    Zhuo Ma
    Yang Liu
    Zhuzhu Wang
    Haoran Ge
    Meng Zhao
    Neural Computing and Applications, 2020, 32 : 16819 - 16831
  • [44] A machine learning-based scheme for the security analysis of authentication and key agreement protocols
    Ma, Zhuo
    Liu, Yang
    Wang, Zhuzhu
    Ge, Haoran
    Zhao, Meng
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (22): : 16819 - 16831
  • [45] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [46] Web Based Security Analysis of OPASS Authentication Schemes using Mobile Application
    Rama, M.
    Raja, S. Selvakumar
    2013 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN VLSI, EMBEDDED SYSTEM, NANO ELECTRONICS AND TELECOMMUNICATION SYSTEM (ICEVENT 2013), 2013,
  • [47] Security flaws in authentication and key establishment protocols for mobile communications
    Shim, K
    Lee, YR
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 62 - 74
  • [48] Security protocols for biometrics-based cardholder authentication in smartcards
    Rila, L
    Mitchell, CJ
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 254 - 264
  • [49] A denial-of-service resistant authentication solution for security protocols
    Li, Yinqing
    Chen, Jianhui
    IITA 2007: WORKSHOP ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, PROCEEDINGS, 2007, : 103 - 106
  • [50] An Automated Precise Authentication of Vehicles for Enhancing the Visual Security Protocols
    Roy, Kumarmangal
    Ahmad, Muneer
    Ghani, Norjihan Abdul
    Uddin, Jia
    Shin, Jungpil
    INFORMATION, 2023, 14 (08)