DocumentCode :
2599622
Title :
Security Verification for Authentication and Key Exchange Protocols, Revisited
Author :
Ota, Haruki ; Kiyomoto, Shinsaku ; Tanaka, Toshiaki
Author_Institution :
Inf. Security Lab., KDDI R&D Labs., Inc., Saitama, Japan
fYear :
2010
fDate :
20-23 April 2010
Firstpage :
226
Lastpage :
233
Abstract :
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. We proposed a security verification method (OKT method) for authentication and key exchange protocols based on Bellare et al.´s model (BPR model). However, there is an estrangement between the security of the OKT method and the BPR model. In this paper, we reconsider the OKT method and once again propose a security verification method for authentication and key exchange protocols based on the BPR model. In particular, we show the novel verification points for each security property in the authentication and key exchange protocols.
Keywords :
cryptographic protocols; formal verification; message authentication; BPR model; OKT method; authentication; key exchange protocols; security requirements; security verification method; Authentication; Business process re-engineering; Computational complexity; Conferences; Cryptographic protocols; Cryptography; Formal verification; Information security; Laboratories; Logic functions; authentication and key exchange protocols; security verification method; verification points;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on
Conference_Location :
Perth, WA
Print_ISBN :
978-1-4244-6701-3
Type :
conf
DOI :
10.1109/WAINA.2010.43
Filename :
5480900
Link To Document :
بازگشت