Simulation Based Validation Of Authentication Protocols

作者: V. S. Suku Nair , Krishnan G. Indiradevi

DOI:

关键词:

摘要: Authentication protocols help to establish trust about the identities of communicating entities. Along with authorization and data confidentiality, authentication forms a critical component most non-trivial security frameworks. Over past several years, an alarming number seemingly secure have been shown be flawed. By exploiting such flaws, malicious entities can potentially take on trusted Attacks are often too subtle uncover by simple means, hence considerable research has gone into techniques for analyzing verifying them. Though problem is perhaps best studied using formal methods, in that category generally rather complex specialized. This paper proposes different approach - simulation as means validation. unable conclusively prove security, very effective uncovering hidden flaws. could particularly useful large systems where it may nearly impractical apply methods. A framework presented model state machines validate some their properties through simulation.

参考文章(16)
Catherine A. Meadows, Catherine A. Meadows, Formal Verification of Cryptographic Protocols: A Survey international cryptology conference. pp. 135- 150 ,(1994) , 10.1007/BFB0000430
H. Troy Nagle, J. David Irwin, Bill D. Carroll, Victor P. Nelson, Digital Logic Circuit Analysis and Design ,(1995)
J.K. Millen, The Interrogator model ieee symposium on security and privacy. pp. 251- 260 ,(1995) , 10.1109/SECPRI.1995.398937
Catherine Meadows, The NRL Protocol Analyzer: An Overview☆ Journal of Logic Programming. ,vol. 26, pp. 113- 131 ,(1996) , 10.1016/0743-1066(95)00095-X
Michael Burrows, Martin Abadi, Roger Needham, A logic of authentication ACM Transactions on Computer Systems. ,vol. 8, pp. 18- 36 ,(1990) , 10.1145/77648.77649
Daniel Brand, Pitro Zafiropulo, On Communicating Finite-State Machines Journal of the ACM. ,vol. 30, pp. 323- 342 ,(1983) , 10.1145/322374.322380
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
Y.V. Hoskote, J.A. Abraham, D.S. Fussell, Automated verification of temporal properties specified as state machines in VHDL great lakes symposium on vlsi. pp. 100- 105 ,(1995) , 10.1109/GLSV.1995.516033
L. Gong, R. Needham, R. Yahalom, Reasoning about belief in cryptographic protocols ieee symposium on security and privacy. pp. 234- 248 ,(1990) , 10.1109/RISP.1990.63854
R. Bird, I. Gopal, A. Herzberg, P.A. Janson, S. Kutten, R. Molva, M. Yung, Systematic design of a family of attack-resistant authentication protocols IEEE Journal on Selected Areas in Communications. ,vol. 11, pp. 679- 693 ,(1993) , 10.1109/49.223869