• DocumentCode
    1799990
  • Title

    Design requirements to counter parallel session attacks in security protocols

  • Author

    Jurcut, Anca D. ; Coffey, Tom ; Dojen, Reiner

  • Author_Institution
    Univ. of Limerick, Limerick, Ireland
  • fYear
    2014
  • fDate
    23-24 July 2014
  • Firstpage
    298
  • Lastpage
    305
  • Abstract
    This work is concerned with the possible exploitation of weaknesses in security protocols by attackers using parallel session attacks and discovering ways of eliminating these weaknesses. A new analysis is presented on the reasons why security protocols, with certain weaknesses in their design, are vulnerable to parallel session attacks. Building on this analysis a new set of design requirements is proposed, whose aim is to eliminate these vulnerabilities. The proposed set of design requirements is evaluated by applying them to a range of security protocols with known weaknesses as well as protocols known to be free of these weaknesses. The results of the evaluation indicate that the set of design requirements are effective as: protocols with known weaknesses violate some of the rules, while protocols without weaknesses do not violate any of the rules.
  • Keywords
    cryptographic protocols; cryptographic expression; design requirements; parallel session attacks; security protocols; Encryption; Generators; Protocols; Public key; Receivers; design requirements; parallel session attacks; security protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on
  • Conference_Location
    Toronto, ON
  • Print_ISBN
    978-1-4799-3502-4
  • Type

    conf

  • DOI
    10.1109/PST.2014.6890952
  • Filename
    6890952