Validating attacks on authentication protocols

被引:0
|
作者
Hagalisletto, Anders Moen [1 ]
机构
[1] Univ Oslo, Dept Informat, N-0316 Oslo, Norway
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and poor protocols that might continue to be used although they may contain irreparable errors. This paper describes a novel method for validating attacks on authentication protocols. based on a strategy for checking that all elements of the attack have been legally obtained. A Maude-program which implements the method, identified errors in attacks on the Wide Mouthed Frog and Yahalom authentication protocols. More generally; the paper shows that the method will find all errors in attacks that originates from incompleteness of cryptographic assumptions. The main implications is that new attacks can be effectively validated even when an exhaustive state-space analysis becomes infeasible. 14,e expect that in the future; validation will be an obligatory part in effectively checking the soundness of any attacks on security protocols.
引用
收藏
页码:362 / 369
页数:8
相关论文
共 50 条
  • [1] A bound on attacks on authentication protocols
    Stoller, SD
    [J]. FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
  • [2] Errors in attacks on authentication protocols
    Hagalisletto, Anders Moen
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 223 - 229
  • [3] Attacks on Recent RFID Authentication Protocols
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
  • [4] Attacks on Recent RFID Authentication Protocols
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    [J]. Journal of Signal Processing Systems, 2015, 79 : 271 - 283
  • [5] Secure authentication protocols resistant to guessing attacks
    Luo, Jia-Ning
    Shieh, Shiuhpyng
    Shen, Ji-Chiang
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (05) : 1125 - 1143
  • [6] Development in Authentication of AODV Protocols to Resist the Attacks
    Alomari, Ahmad
    [J]. INFORMATION AND SOFTWARE TECHNOLOGIES (ICIST 2013), 2013, 403 : 334 - 344
  • [7] Passive attacks on a class of authentication protocols for RFID
    Alomair, Basel
    Lazos, Loukas
    Poovendran, Radha
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
  • [8] Design of Authentication Protocols Preventing Replay Attacks
    Li, Junhong
    [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
  • [9] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [10] Attacks on CKK family of RFID authentication protocols
    Golebiewski, Zbigniew
    Majcher, Krzysztof
    Zagorski, Filip
    [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +