A machine learning-based scheme for the security analysis of authentication and key agreement protocols

被引:0
|
作者
Zhuo Ma
Yang Liu
Zhuzhu Wang
Haoran Ge
Meng Zhao
机构
[1] Xidian University,School of Cyber Engineering
来源
关键词
Authentication protocols; Machine learning; Formal analysis of protocol security; Protocol dataset;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a novel machine learning-based scheme for the automatic analysis of authentication and key agreement protocols. Considering the traditional formal protocol analysis schemes, their analysis accuracies depend heavily on the prior knowledge possessed by the analyst and the subjective understanding of the protocol. The rapid development of artificial intelligence in security field shows that the ideal way to get rid of the dependency is to use machine learning. Hence, we elaborately compare more than 2000 protocol analysis results and select 500 most representative ones of them to build a protocol dataset. Combining the protocol representation method of traditional schemes, these selected protocols are expressed as weight matrixes based on security components. Furthermore, a machine learning-based security analysis model is proposed to automatically find the attacks of the protocol. For now, three types of attacks against authentication and key agreement protocols can be identified based on our model. And experiment results show that it can reach almost 72% upper-bound performance. From the derivative of the accuracy curves, it can be inferred that the performance of our scheme will definitely get better as the dataset expands.
引用
收藏
页码:16819 / 16831
页数:12
相关论文
共 50 条
  • [1] A machine learning-based scheme for the security analysis of authentication and key agreement protocols
    Ma, Zhuo
    Liu, Yang
    Wang, Zhuzhu
    Ge, Haoran
    Zhao, Meng
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (22): : 16819 - 16831
  • [2] A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
    Zahednejad, Behnam
    Ke, Lishan
    Li, Jing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [3] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
    Barbosa, Manuel
    Farshim, Pooya
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253
  • [4] Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review
    Khalfaoui, Sameh
    Leneutre, Jean
    Villard, Arthur
    Gazeau, Ivan
    Ma, Jingxuan
    Urien, Pascal
    [J]. SENSORS, 2021, 21 (24)
  • [5] A key agreement scheme for identity authentication based on multiple security factors
    College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan
    Shanxi
    030024, China
    不详
    Shanxi
    030012, China
    [J]. Int. J. Simul. Syst. Sci. Technol., 3 (13.1-13.7):
  • [6] Questioning the Security of Three Recent Authentication and Key Agreement Protocols
    Rahmani, Amir Masoud
    Mohammadi, Mokhtar
    Rashidi, Shima
    Lansky, Jan
    Mildeova, Stanislava
    Safkhani, Masoumeh
    Kumari, Saru
    Hosseinzadeh, Mehdi
    [J]. IEEE ACCESS, 2021, 9 : 98204 - 98217
  • [7] Security Analysis and Improvements of a Password-Based Mutual Authentication Scheme with Session Key Agreement
    An, Younghwa
    Joo, Youngdo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 85 - 94
  • [8] Security weaknesses of a signature scheme and authenticated key agreement protocols
    Nose, Peter
    [J]. INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 107 - 115
  • [9] Learning with error-based key agreement and authentication scheme for satellite communication
    Kumar, Uddeshaya
    Garg, Manish
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2022, 40 (02) : 83 - 95
  • [10] Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement
    Sonam Devgan Kaul
    Amit K. Awasthi
    [J]. Wireless Personal Communications, 2016, 89 : 621 - 637