Security Verification for Authentication and Key Exchange Protocols

被引:0
|
作者
Otat, Haruki [1 ]
Kiyomotot, Shinsaku [1 ]
Tanakat, Toshiaki [1 ]
机构
[1] KDDI R&D Labs Inc, Informat Secur Lab, 2-1-15 Ohara, Saitama 3568502, Japan
关键词
Security Verification Method; Authentication and Key Exchange Protocols; Verification Points; Bellare et al.'s Model; Ubiquitous Environment;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a ubiquitous environment, it is preferable for authentication and key exchange protocols to be optimized automatically in accordance with security requirements. In this paper, we propose a security verification method for authentication and key exchange protocols that is based on Bellare et al.'s model. In particular, we show the verification points of one security property for authentication protocols and five security properties for key exchange protocols. We show that this method is valid by verifying the security of four typical examples of the authentication and key exchange protocols and the 87 authentication and key exchange protocols which were generated automatically.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 50 条
  • [1] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [2] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 7 - 13
  • [3] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 1 - 13
  • [4] Security model and modular design of fair authentication key exchange protocols
    FENG DengGuo & CHEN WeiDong State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2010, 53 (02) : 278 - 287
  • [5] Security model and modular design of fair authentication key exchange protocols
    DengGuo Feng
    WeiDong Chen
    [J]. Science China Information Sciences, 2010, 53 : 278 - 287
  • [6] Security model and modular design of fair authentication key exchange protocols
    Feng DengGuo
    Chen WeiDong
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (02) : 278 - 287
  • [7] SEVERAL PRACTICAL PROTOCOLS FOR AUTHENTICATION AND KEY EXCHANGE
    LIM, CH
    LEE, PJ
    [J]. INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 91 - 96
  • [8] Security of public key certificate based authentication protocols
    Wen, W
    Saito, T
    Mizoguchi, F
    [J]. PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 196 - 209
  • [9] On the security of an enhanced authentication key exchange protocol
    Hwang, MS
    Chang, TY
    Lin, SC
    Tsai, CS
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 160 - 163
  • [10] Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices
    Jarosz, Michal
    Wrona, Konrad
    Zielinski, Zbigniew
    [J]. PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 617 - 625