VERIFICATION AND MODELING OF AUTHENTICATION PROTOCOLS

被引:0
|
作者
HAUSER, RC [1 ]
LEE, ES [1 ]
机构
[1] UNIV TORONTO, DEPT COMP SCI, TORONTO M5S 1A4, ONTARIO, CANADA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the emergence of numerous distributed services, the importance of electronic authentication in networks is rapidly increasing. Many authentication protocols have been proposed and discussed. Burrows, Abadi and Needham [BAN1] created alogic of authentication to formally analyze authentication protocols. This BAN-logic has been subject to critique and several extensions have been suggested. Nonetheless, due to its straightforward design and its ease-of-use, it attracts the attention of current research. In this paper, an authentication logic is proposed which is built closely after the BAN-logic. It addressers answers to important criticisms of BAN like the non-disclosure problem, and avoids some newly discovered weaknesses of BAN, e.g. with respect to freshness. It also does not require any idealization which is a major hurdle to the correct usage of BAN. This extended BAN-logic is instrumented as a verification tool which also allows for modelling the different protocol participants as finite state machines. Also, actions of intruders, consequences of such intrusions, and the respective counter-measures can be modelled and simulated.
引用
收藏
页码:141 / 154
页数:14
相关论文
共 50 条
  • [1] Property verification for authentication protocols
    Indiradevi, K
    Nair, VSS
    Abraham, JA
    [J]. ASSET'99: 1999 IEEE SYMPOSIUM ON APPLICATION-SPECIFIC SYSTEMS AND SOFTWARE ENGINEERING & TECHNOLOGY - PROCEEDINGS, 1999, : 82 - 85
  • [2] An Approach for Formal Verification of Authentication Protocols
    A. M. Mironov
    [J]. Lobachevskii Journal of Mathematics, 2022, 43 : 443 - 454
  • [3] An Approach for Formal Verification of Authentication Protocols
    Mironov, A. M.
    [J]. LOBACHEVSKII JOURNAL OF MATHEMATICS, 2022, 43 (02) : 443 - 454
  • [5] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [6] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [7] Knowledge structure approach to verification of authentication protocols
    Su, KL
    Lü, GF
    Chen, QL
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (04): : 513 - 532
  • [8] Verification of authentication protocols based on the binding relation
    Hagiya, M
    Takemura, R
    Takahashi, K
    Saito, T
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 299 - 316
  • [9] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [10] Knowledge structure approach to verification of authentication protocols
    Kaile Su
    Guanfeng Lü
    Qingliang Chen
    [J]. Science in China Series F: Information Sciences, 2005, 48 : 513 - 532