DocumentCode
3039746
Title
Discovering Man-in-the-Middle Attacks in Authentication Protocols
Author
Guha, Ratan K. ; Furqan, Zeeshan ; Muhammad, Shahabuddin
fYear
2007
fDate
29-31 Oct. 2007
Firstpage
1
Lastpage
7
Abstract
Security protocols are widely used to provide secure communication in many critical applications such as e-commerce and defense. Numerous formal methods have been used to ensure the desired working of security protocols. Formal methods provide rigorous analysis but are complex, whereas informal method are simple but lack the power to express the details of the analysis. Strand-space framework has become a popular formal method for analyzing security protocols due to its graph-theoretic nature. Benefiting from the expressiveness of this method and utilizing the intuitiveness of informal logical arguments, we propose a simplified generic approach based on a challenge-response criterion to discover man-in-the-middle attacks in authentication protocols. Man-in-the-middle attacks result in discrepancies in the parameters among the participants of a protocol. To discover the possibility of man-in-the-middle attack on a protocol, we propose that each participant investigate the parameters of the other participants of the protocol by finding out the true originator of its received messages. With the help of an example, we demonstrate how the inability in finding out the true originator of a message guides us through a sequence of logical arguments eventually leading to a successful man-in-the-middle attack.
Keywords
Authentication; Costs; Cryptographic protocols; Cryptography; Electronic commerce; Formal verification; History; Security; Telecommunication network reliability;
fLanguage
English
Publisher
ieee
Conference_Titel
Military Communications Conference, 2007. MILCOM 2007. IEEE
Conference_Location
Orlando, FL, USA
Print_ISBN
978-1-4244-1513-7
Electronic_ISBN
978-1-4244-1513-7
Type
conf
DOI
10.1109/MILCOM.2007.4455039
Filename
4455039
Link To Document