Title :
Automatic security verification for 3-party authentication and key exchange protocols
Author :
Ota, Haruki ; Kiyomoto, Shinsaku ; Miyake, Yutaka
Author_Institution :
Inf. Security Lab., KDDI R&D Labs., Inc., Saitama, Japan
Abstract :
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, we proposed a security verification method for 2-party authentication and key exchange protocols based on Bellare et al.´s model and showed the verification points of the security properties to verify their security efficiently. However, 3-party authentication and key exchange protocols have more security properties than 2-party protocols: key privacy and security against a malicious insider. In this paper, we describe the novel security properties for 3-party protocols and show the verification point of key privacy. We also show the validity of the proposed method by explaining how it verifies the 3-party protocols as two verification examples. Our method is the first automatic security verification method that can verify the aforementioned security properties.
Keywords :
cryptographic protocols; 2-party authentication; 3-party authentication; automatic security verification method; key exchange protocols; key privacy; malicious insider; Authentication; Business process re-engineering; Cryptography; Hafnium; Privacy; Protocols;
Conference_Titel :
Network and System Security (NSS), 2011 5th International Conference on
Conference_Location :
Milan
Print_ISBN :
978-1-4577-0458-1
DOI :
10.1109/ICNSS.2011.6060010