DocumentCode :
1886306
Title :
Designing Authentication Protocols: Trends and Issues
Author :
Muhammad, Shahabuddin ; Furqan, Zeeshan ; Guha, Ratan K.
Author_Institution :
University of Central Florida
fYear :
2006
fDate :
23-29 April 2006
Firstpage :
76
Lastpage :
76
Abstract :
The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable methods in the design of secure systems. Security protocols are one of the most important design parameters. History has proven security protocols to be vulnerable even after they enjoyed circumspect design and meticulous review by experts. Plethora of formal systems exist in order to verify a security protocol. We posit that understanding the subtle issues in security protocols is important when designing a formal framework. In particular, we discuss authentication protocols. We mention their characteristics and point out important design features that a security protocol designer should focus in the design process. We also describe the notion of a penetrator and specify his characteristics. Our purpose is to emphasize the design criteria of an authentication protocol, clarify some subtleties, and give suggestions and pointers that may become helpful in the field of design and verification of cryptographic protocols.
Keywords :
Authentication; Computer network reliability; Computer science; Computer security; Cryptographic protocols; Cryptography; Data security; History; Internet; Robots;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on
Print_ISBN :
0-7695-2552-0
Type :
conf
DOI :
10.1109/ICNICONSMCL.2006.76
Filename :
1628322
Link To Document :
بازگشت