Analysis of Security Protocols Based on Authentication Test
نویسندگان
چکیده
منابع مشابه
Authentication Test - Based the RFID Authentication Protocol with Security Analysis
To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authenticat...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولNetwork Security Analysis Based on Authentication Techniques
Network Security issues are now becoming important as society is moving to digital information age. Data security is the utmost critical component in ensuring safe transmission of information through the internet. It comprises authorization of access to information in a network, controlled by the network administrator. The task of Network security not only requires ensuring the security of end ...
متن کاملSecurity Analysis of a Suite of Deniable Authentication Protocols
A deniable authentication protocol allows a sender to transfer an authenticated message to a receiver, and the receiver cannot prove to a third party about the source of the message. In 2006, Zhu et al. analyzed deniable authentication protocols proposed by Deng et al. in 2001, which were based on a protocol proposed by Aumann et al. in 1998. In this paper, we show that the modified protocols b...
متن کاملSecurity Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and MAP, which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchronization between the RFID reader and the tag in a singl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Software
سال: 2006
ISSN: 1000-9825
DOI: 10.1360/jos170148