Design and Formal Analysis of Highly Effective Authentication Protocol

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Analysis of the Kerberos Authentication Protocol

FORMAL ANALYSIS OF THE KERBEROS AUTHENTICATION PROTOCOL Joe-Kai Tsay Andre Scedrov, Advisor The security of cryptographic protocols has traditionally been verified with respect to one of two mathematical models: One, known as the Dolev-Yao or symbolic model, abstracts cryptographic concepts into an algebra of symbolic messages. Methods based on the Dolev-Yao abstraction, which make use of simpl...

متن کامل

Formal Protocol Design of ESIKE Based on Authentication Tests

In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE) protocol. Then we formally prove the secure properties of ESIKE with strand space model and authentication tests. The ESIKE protocol overcomes the security shortages of the Internet Key Exchange (IKE), and can provide...

متن کامل

Formal Security Analysis of the DNP3-Secure Authentication Protocol

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of many utility industries and critical infrastructures. The Distributed Network Protocol Version 3 (DNP3) is one of the non-proprietary protocols used to facilitate substation communications within SCADA networks via serial-lines or TCP/IP protocols. DNP3 is the defacto standard for powergrid automation, ho...

متن کامل

Formal Analysis of RFID Authentication Protocol for Security System

Recently, Radio frequency identification (RFID) has been an important and ubiquitous infrastructure technology for smart work system. As RFID tags are affixed to all items, they may be used to support various useful services. Security mechanisms for RFID systems, such as authentication and encryption, are therefore of utmost importance. However, there are many risks involved, for example user p...

متن کامل

Formal analysis of Facebook Connect Single Sign-On authentication protocol

We present a formal analysis of the authentication protocol of Facebook Connect, the Single Sign-On service offered by the Facebook Platform which allows Facebook users to login to affiliated sites. Formal specification and verification have been carried out using the specification language HLPSL and AVISPA, a state-of-the-art verification tool for security protocols. AVISPA has revealed two se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Engineering

سال: 2012

ISSN: 1877-7058

DOI: 10.1016/j.proeng.2012.01.454