DocumentCode
2344241
Title
Security analysis and improvement of Yahalom protocol
Author
Chen, Li ; Shi, Mingxia
Author_Institution
Comput. Centre, Henan Univ. of Finance & Econ., Zhengzhou
fYear
2008
fDate
3-5 June 2008
Firstpage
1137
Lastpage
1140
Abstract
Logic-based formal analysis methods are the efficient methods for analyzing the security of cryptography protocols. The paper analyzes the security of the Yahalom protocol by employing the formal method SVO logic and finds that the protocol does not achieve the authentication goals. By modifying message format and adding handshake message, the paper also proposes a novel improved Yahalom protocol, which removes the limitations that the original Yahalom protocol cannot against the reply attack and the BAN-Yahalom protocol cannot resist impersonation attack. The analysis results of the improved Yahalom protocol reveal that the protocol completes the strong goals of identity authentication and key negotiation.
Keywords
cryptographic protocols; formal logic; message authentication; Yahalom protocol; authentication goals; cryptography protocols; formal method SVO logic; handshake message; logic-based formal analysis methods; message format; security analysis; Authentication; Cryptographic protocols; Cryptography; Finance; IP networks; Industrial training; Information security; Logic; Niobium; Resists;
fLanguage
English
Publisher
ieee
Conference_Titel
Industrial Electronics and Applications, 2008. ICIEA 2008. 3rd IEEE Conference on
Conference_Location
Singapore
Print_ISBN
978-1-4244-1717-9
Electronic_ISBN
978-1-4244-1718-6
Type
conf
DOI
10.1109/ICIEA.2008.4582696
Filename
4582696
Link To Document