Title :
Prerequisites to authentication protocols proved by binding theory
Author_Institution :
IT Center, China Central Radio & TV Univ., Beijing, China
Abstract :
The paper proposes a binding theory and security prerequisites proposition to authentication protocols. The binding theory constructs a formal theory model by which can quickly infer some security properties. Binding theory comes from the basic ideas that the key used in cryptographic protocols is the kernel component for the security protocols. Based on binding theory, security prerequisites proposition to authentication protocols is modeled and proved. Binding theory and security prerequisites proposition to authentication protocols can simply and efficiently decide security properties when authentication protocols have security weakness for authentication properties. Some classical security protocols are taken as examples to infer and discover some of their security properties broken by binding theory and security prerequisites proposition.
Keywords :
cryptographic protocols; message authentication; authentication protocols; binding theory; cryptographic protocols; security prerequisites proposition; security protocols; Authentication; Cryptographic protocols; Cryptography; Electronic learning; Finance; Internet; Kernel; NP-hard problem; Security; TV; Binding Term; Security Binding Terms; Security Prerequisite; Strand Space Theory;
Conference_Titel :
Granular Computing, 2009, GRC '09. IEEE International Conference on
Conference_Location :
Nanchang
Print_ISBN :
978-1-4244-4830-2
DOI :
10.1109/GRC.2009.5255038