Fast and Automatic Verification of Authentication and Key Exchange Protocols 1

نویسندگان

  • Haruki Ota
  • Shinsaku Kiyomoto
  • Yutaka Miyake
چکیده

1 Preliminary versions of this paper appeared in [1, 2]. Summary It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, we proposed the security verification method (OKT method) for the aforementioned protocols based on Bellare et al.'s model (BPR model) and showed the verification points of security properties to verify their security efficiently. However, there is an estrangement between the security of the OKT method and the BPR model. In this paper, we reconsider the OKT method and propose an updated security verification method for authentication and key exchange protocols based on the BPR model. In particular, we revise the procedure of the OKT method to address the aforementioned issue. We show the novel verification points for each security property in the authentication and key exchange protocols in accordance with the aforementioned revisions. In addition, we describe the relations among the six verification points, explain how the proposed method verifies the aforementioned protocols by providing one example and show the validity of the proposed method by verifying the security of 87 authentication and key exchange protocols that were generated automatically.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Fast automatic security protocol generation

An automatic security protocol generator is described that useslogic-based heuristic rules to guide it in a backward search for suitableprotocols from protocol goals. The approach taken is unlike exist-ing automatic protocol generators which typically carry out a forwardsearch for candidate protocols from the protocol assumptions. A pro-totype generator has been built th...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

On the security analysis of authenticated group key exchange protocols for low-power mobile devices

Secure communications are paramount in today’s wireless network system, where highly sensitive information is delivered through mobile applications. Cryptographic protocols are used to provide security services, such as confidentiality, authentication and non-repudiation. The design of secure group key exchange protocols is one of many important security issues in wireless networks. Recently, B...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011