Title :
Security analysis and improvement of Yahalom protocol
Author :
Chen, Li ; Shi, Mingxia
Author_Institution :
Comput. Centre, Henan Univ. of Finance & Econ., Zhengzhou
Abstract :
Logic-based formal analysis methods are the efficient methods for analyzing the security of cryptography protocols. The paper analyzes the security of the Yahalom protocol by employing the formal method SVO logic and finds that the protocol does not achieve the authentication goals. By modifying message format and adding handshake message, the paper also proposes a novel improved Yahalom protocol, which removes the limitations that the original Yahalom protocol cannot against the reply attack and the BAN-Yahalom protocol cannot resist impersonation attack. The analysis results of the improved Yahalom protocol reveal that the protocol completes the strong goals of identity authentication and key negotiation.
Keywords :
cryptographic protocols; formal logic; message authentication; Yahalom protocol; authentication goals; cryptography protocols; formal method SVO logic; handshake message; logic-based formal analysis methods; message format; security analysis; Authentication; Cryptographic protocols; Cryptography; Finance; IP networks; Industrial training; Information security; Logic; Niobium; Resists;
Conference_Titel :
Industrial Electronics and Applications, 2008. ICIEA 2008. 3rd IEEE Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-1717-9
Electronic_ISBN :
978-1-4244-1718-6
DOI :
10.1109/ICIEA.2008.4582696