Fast and Automatic Verification of Authentication and Key Exchange Protocols 1
نویسندگان
چکیده
1 Preliminary versions of this paper appeared in [1, 2]. Summary It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, we proposed the security verification method (OKT method) for the aforementioned protocols based on Bellare et al.'s model (BPR model) and showed the verification points of security properties to verify their security efficiently. However, there is an estrangement between the security of the OKT method and the BPR model. In this paper, we reconsider the OKT method and propose an updated security verification method for authentication and key exchange protocols based on the BPR model. In particular, we revise the procedure of the OKT method to address the aforementioned issue. We show the novel verification points for each security property in the authentication and key exchange protocols in accordance with the aforementioned revisions. In addition, we describe the relations among the six verification points, explain how the proposed method verifies the aforementioned protocols by providing one example and show the validity of the proposed method by verifying the security of 87 authentication and key exchange protocols that were generated automatically.
منابع مشابه
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملFast automatic security protocol generation
An automatic security protocol generator is described that useslogic-based heuristic rules to guide it in a backward search for suitableprotocols from protocol goals. The approach taken is unlike exist-ing automatic protocol generators which typically carry out a forwardsearch for candidate protocols from the protocol assumptions. A pro-totype generator has been built th...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملOn the security analysis of authenticated group key exchange protocols for low-power mobile devices
Secure communications are paramount in today’s wireless network system, where highly sensitive information is delivered through mobile applications. Cryptographic protocols are used to provide security services, such as confidentiality, authentication and non-repudiation. The design of secure group key exchange protocols is one of many important security issues in wireless networks. Recently, B...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011