Errors in attacks on authentication protocols

被引:0
|
作者
Hagalisletto, Anders Moen [1 ]
机构
[1] Univ Oslo, Dept Informat, N-0316 Oslo, Norway
关键词
security protocols; attacks; validation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A tool for automated validation of attacks on authentication protocols has been used to find several flaws and ambiguities in the list of attacks described in the well known report by Clark and Jacob. In this paper the errors are presented and classified. Corrected descriptions of the incorrect attacks are given for the attacks that can be easily repaired.
引用
收藏
页码:223 / 229
页数:7
相关论文
共 50 条
  • [1] Validating attacks on authentication protocols
    Hagalisletto, Anders Moen
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 362 - 369
  • [2] A bound on attacks on authentication protocols
    Stoller, SD
    [J]. FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
  • [3] Attacks on Recent RFID Authentication Protocols
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
  • [4] Attacks on Recent RFID Authentication Protocols
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    [J]. Journal of Signal Processing Systems, 2015, 79 : 271 - 283
  • [5] Secure authentication protocols resistant to guessing attacks
    Luo, Jia-Ning
    Shieh, Shiuhpyng
    Shen, Ji-Chiang
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (05) : 1125 - 1143
  • [6] Development in Authentication of AODV Protocols to Resist the Attacks
    Alomari, Ahmad
    [J]. INFORMATION AND SOFTWARE TECHNOLOGIES (ICIST 2013), 2013, 403 : 334 - 344
  • [7] Passive attacks on a class of authentication protocols for RFID
    Alomair, Basel
    Lazos, Loukas
    Poovendran, Radha
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
  • [8] Design of Authentication Protocols Preventing Replay Attacks
    Li, Junhong
    [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
  • [9] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [10] Attacks on CKK family of RFID authentication protocols
    Golebiewski, Zbigniew
    Majcher, Krzysztof
    Zagorski, Filip
    [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +