Title :
A Directed Graph-Based Authentication Protocol Model and Its Security Analysis
Author :
Hong-Bo Xie ; Wu, Yuan-chen ; Ming-Tian Zhou
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu
Abstract :
The formal description of authentication protocol and its security analysis is one of the important issues in the protocol analysis. In order to solve the problem in the formal description of cryptographic protocol, a method based on directed graph is presented to formally depict the authentication protocol specification. Meanwhile, a converse-searching algorithm based on directed graph is also presented to construct the protocol messages. When this method is used to analyze WOO-LAM authentication, a new flow and its attacking trace have been founded
Keywords :
authorisation; cryptography; directed graphs; formal specification; protocols; search problems; WOO-LAM authentication; authentication protocol specification; converse-searching algorithm; cryptographic protocol; directed graph; security analysis; Authentication; Body sensor networks; Buildings; Computer science; Computer security; Cryptographic protocols; Data security; Logic; Protection; Public key cryptography;
Conference_Titel :
Frontier of Computer Science and Technology, 2006. FCST '06. Japan-China Joint Workshop on
Conference_Location :
Fukushima
Print_ISBN :
0-7695-2721-3
DOI :
10.1109/FCST.2006.2