DocumentCode
2599622
Title
Security Verification for Authentication and Key Exchange Protocols, Revisited
Author
Ota, Haruki ; Kiyomoto, Shinsaku ; Tanaka, Toshiaki
Author_Institution
Inf. Security Lab., KDDI R&D Labs., Inc., Saitama, Japan
fYear
2010
fDate
20-23 April 2010
Firstpage
226
Lastpage
233
Abstract
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. We proposed a security verification method (OKT method) for authentication and key exchange protocols based on Bellare et al.´s model (BPR model). However, there is an estrangement between the security of the OKT method and the BPR model. In this paper, we reconsider the OKT method and once again propose a security verification method for authentication and key exchange protocols based on the BPR model. In particular, we show the novel verification points for each security property in the authentication and key exchange protocols.
Keywords
cryptographic protocols; formal verification; message authentication; BPR model; OKT method; authentication; key exchange protocols; security requirements; security verification method; Authentication; Business process re-engineering; Computational complexity; Conferences; Cryptographic protocols; Cryptography; Formal verification; Information security; Laboratories; Logic functions; authentication and key exchange protocols; security verification method; verification points;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on
Conference_Location
Perth, WA
Print_ISBN
978-1-4244-6701-3
Type
conf
DOI
10.1109/WAINA.2010.43
Filename
5480900
Link To Document