A hierarchy of authentication specifications

作者: G. Lowe

DOI: 10.1109/CSFW.1997.596782

关键词:

摘要: Many security protocols have the aim of authenticating one agent to another. Yet there is no clear consensus in academic literature about precisely what "authentication" means. We suggest that appropriate authentication requirement will depend upon use which protocol put, and identify several possible definitions "authentication". formalize each definition using process algebra CSP, this formalism study their relative strengths, show how model checker FDR can be used test whether a system running meets such specification.

参考文章(22)
Paul Syverson, A Taxonomy of Replay Attacks ieee computer security foundations symposium. pp. 187- 191 ,(1994) , 10.21236/ADA463948
S. M. Bellovin, M. Merritt, Limitations of the Kerberos authentication system acm special interest group on data communication. ,vol. 20, pp. 119- 132 ,(1990) , 10.1145/381906.381946
Tzonelih Hwang, Yung-Hsiang Chen, On the security of SPLICE/AS - The authentication system in WIDE Internet Information Processing Letters. ,vol. 53, pp. 97- 101 ,(1995) , 10.1016/0020-0190(94)00175-X
Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener, Authentication and authenticated key exchanges Designs, Codes and Cryptography. ,vol. 2, pp. 107- 125 ,(1992) , 10.1007/BF00124891
Dorothy E. Denning, Giovanni Maria Sacco, Timestamps in key distribution protocols Communications of The ACM. ,vol. 24, pp. 533- 536 ,(1981) , 10.1145/358722.358740
A.W. Roscoe, Intensional specifications of security protocols Proceedings 9th IEEE Computer Security Foundations Workshop. pp. 28- 38 ,(1996) , 10.1109/CSFW.1996.503688
L.C. Paulson, Proving properties of security protocols by induction ieee computer security foundations symposium. pp. 70- 83 ,(1997) , 10.1109/CSFW.1997.596788
R. Bird, I. Gopal, A. Herzberg, P.A. Janson, S. Kutten, R. Molva, M. Yung, Systematic design of a family of attack-resistant authentication protocols IEEE Journal on Selected Areas in Communications. ,vol. 11, pp. 679- 693 ,(1993) , 10.1109/49.223869