• DocumentCode
    2599622
  • Title

    Security Verification for Authentication and Key Exchange Protocols, Revisited

  • Author

    Ota, Haruki ; Kiyomoto, Shinsaku ; Tanaka, Toshiaki

  • Author_Institution
    Inf. Security Lab., KDDI R&D Labs., Inc., Saitama, Japan
  • fYear
    2010
  • fDate
    20-23 April 2010
  • Firstpage
    226
  • Lastpage
    233
  • Abstract
    It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. We proposed a security verification method (OKT method) for authentication and key exchange protocols based on Bellare et al.´s model (BPR model). However, there is an estrangement between the security of the OKT method and the BPR model. In this paper, we reconsider the OKT method and once again propose a security verification method for authentication and key exchange protocols based on the BPR model. In particular, we show the novel verification points for each security property in the authentication and key exchange protocols.
  • Keywords
    cryptographic protocols; formal verification; message authentication; BPR model; OKT method; authentication; key exchange protocols; security requirements; security verification method; Authentication; Business process re-engineering; Computational complexity; Conferences; Cryptographic protocols; Cryptography; Formal verification; Information security; Laboratories; Logic functions; authentication and key exchange protocols; security verification method; verification points;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on
  • Conference_Location
    Perth, WA
  • Print_ISBN
    978-1-4244-6701-3
  • Type

    conf

  • DOI
    10.1109/WAINA.2010.43
  • Filename
    5480900