The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] protocol analysis(1hit)

1-1hit
  • A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Takamichi SAITO  

     
    PAPER-Application Information Security

      Vol:
    E92-D No:6
      Page(s):
    1268-1279

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).