Title :
Security Verification for Authentication and Key Exchange Protocols, Revisited
Author :
Ota, Haruki ; Kiyomoto, Shinsaku ; Tanaka, Toshiaki
Author_Institution :
Inf. Security Lab., KDDI R&D Labs., Inc., Saitama, Japan
Abstract :
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. We proposed a security verification method (OKT method) for authentication and key exchange protocols based on Bellare et al.´s model (BPR model). However, there is an estrangement between the security of the OKT method and the BPR model. In this paper, we reconsider the OKT method and once again propose a security verification method for authentication and key exchange protocols based on the BPR model. In particular, we show the novel verification points for each security property in the authentication and key exchange protocols.
Keywords :
cryptographic protocols; formal verification; message authentication; BPR model; OKT method; authentication; key exchange protocols; security requirements; security verification method; Authentication; Business process re-engineering; Computational complexity; Conferences; Cryptographic protocols; Cryptography; Formal verification; Information security; Laboratories; Logic functions; authentication and key exchange protocols; security verification method; verification points;
Conference_Titel :
Advanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on
Conference_Location :
Perth, WA
Print_ISBN :
978-1-4244-6701-3
DOI :
10.1109/WAINA.2010.43