DocumentCode :
3279304
Title :
Security verification for authentication and key exchange protocols
Author :
Ota, Haruki ; Kiyomoto, Shinsaku ; Tanaka, Toshiaki
Author_Institution :
KDDI R&D Labs., Inc., Fujimino
fYear :
2008
fDate :
7-10 Dec. 2008
Firstpage :
1
Lastpage :
6
Abstract :
In a ubiquitous environment, it is preferable for authentication and key exchange protocols to be optimized automatically in accordance with the security requirements. In this paper, we propose a security verification method for the authentication and key exchange protocols that is based on Bellare et al.´ s model. In particular, we show the verification points of one security property for authentication protocols and five security properties for key exchange protocols. We show that this method is valid by verifying four typical examples of the authentication and key exchange protocols.
Keywords :
cryptographic protocols; message authentication; optimisation; ubiquitous computing; authentication protocol; key exchange protocol; message authentication; security verification; ubiquitous environment; Authentication; Business process re-engineering; Communication system control; Cryptography; Dictionaries; Formal verification; Information theory; Logic functions; Protocols; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and Its Applications, 2008. ISITA 2008. International Symposium on
Conference_Location :
Auckland
Print_ISBN :
978-1-4244-2068-1
Electronic_ISBN :
978-1-4244-2069-8
Type :
conf
DOI :
10.1109/ISITA.2008.4895465
Filename :
4895465
Link To Document :
بازگشت