Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps

被引:0
|
作者
Barbosa, Manuel [1 ]
Farshim, Pooya [1 ]
机构
[1] Univ Minho, Dept Informat, P-4710057 Braga, Portugal
来源
关键词
Timestamp; Key Agreement; Entity Authentication; EXCHANGE; NOTIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this technique to two of the most popular models adopted in literature (Bellare-Rogaway and Canetti-Krawczyk). We analyse previous results obtained using these models in light of the proposed extensions, and demonstrate their application to a new class of protocols. In the timed CK model we concentrate on modular design and analysis of protocols, and propose a more efficient timed authenticator relying on timestamps. The structure of this new authenticator implies that an authentication mechanism standardised in ISO-9798 is secure. Finally, we use our timed extension to the BR model to establish the security of an efficient ISO protocol for key transport and unilateral entity authentication.
引用
收藏
页码:235 / 253
页数:19
相关论文
共 50 条
  • [21] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [22] Security analysis of 3GPP authentication and key agreement protocol
    Lu F.
    Zheng K.-F.
    Niu X.-X.
    Yang Y.-X.
    Li Z.-X.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (07): : 1768 - 1782
  • [23] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266
  • [24] SAS-based group authentication and key agreement protocols
    Laur, Sven
    Pasini, Sylvain
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 197 - +
  • [25] Resilient Group Key Agreement Protocol with Authentication Security
    Rajaram, M.
    Thilagavathy, D.
    Devi, N. Kanjana
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGIES (ICICT), 2010,
  • [26] Security enhancement for the "simple authentication key agreement algorithm"
    Lin, IC
    Chang, CC
    Hwang, MS
    24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 113 - 115
  • [27] A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
    Kolesnikov, Vladimir
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 235 - 252
  • [28] On the security of an enhanced UMTS authentication and key agreement protocol
    Hwang, Min-Shiang
    Chong, Song-Kong
    Ou, Hsia-Hung
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2011, 22 (03): : 99 - 112
  • [29] Key agreement and identity authentication protocols for ad hoc networks
    Yao, J
    Zeng, GH
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 720 - 724
  • [30] Security of public key certificate based authentication protocols
    Wen, W
    Saito, T
    Mizoguchi, F
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 196 - 209