• DocumentCode
    2344241
  • Title

    Security analysis and improvement of Yahalom protocol

  • Author

    Chen, Li ; Shi, Mingxia

  • Author_Institution
    Comput. Centre, Henan Univ. of Finance & Econ., Zhengzhou
  • fYear
    2008
  • fDate
    3-5 June 2008
  • Firstpage
    1137
  • Lastpage
    1140
  • Abstract
    Logic-based formal analysis methods are the efficient methods for analyzing the security of cryptography protocols. The paper analyzes the security of the Yahalom protocol by employing the formal method SVO logic and finds that the protocol does not achieve the authentication goals. By modifying message format and adding handshake message, the paper also proposes a novel improved Yahalom protocol, which removes the limitations that the original Yahalom protocol cannot against the reply attack and the BAN-Yahalom protocol cannot resist impersonation attack. The analysis results of the improved Yahalom protocol reveal that the protocol completes the strong goals of identity authentication and key negotiation.
  • Keywords
    cryptographic protocols; formal logic; message authentication; Yahalom protocol; authentication goals; cryptography protocols; formal method SVO logic; handshake message; logic-based formal analysis methods; message format; security analysis; Authentication; Cryptographic protocols; Cryptography; Finance; IP networks; Industrial training; Information security; Logic; Niobium; Resists;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Industrial Electronics and Applications, 2008. ICIEA 2008. 3rd IEEE Conference on
  • Conference_Location
    Singapore
  • Print_ISBN
    978-1-4244-1717-9
  • Electronic_ISBN
    978-1-4244-1718-6
  • Type

    conf

  • DOI
    10.1109/ICIEA.2008.4582696
  • Filename
    4582696