Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Takamichi SAITO, "A Scenario-Based Protocol Checker for Public-Key Authentication Scheme" in IEICE TRANSACTIONS on Information,
vol. E92-D, no. 6, pp. 1268-1279, June 2009, doi: 10.1587/transinf.E92.D.1268.
Abstract: Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E92.D.1268/_p
Copy
@ARTICLE{e92-d_6_1268,
author={Takamichi SAITO, },
journal={IEICE TRANSACTIONS on Information},
title={A Scenario-Based Protocol Checker for Public-Key Authentication Scheme},
year={2009},
volume={E92-D},
number={6},
pages={1268-1279},
abstract={Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).},
keywords={},
doi={10.1587/transinf.E92.D.1268},
ISSN={1745-1361},
month={June},}
Copy
TY - JOUR
TI - A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
T2 - IEICE TRANSACTIONS on Information
SP - 1268
EP - 1279
AU - Takamichi SAITO
PY - 2009
DO - 10.1587/transinf.E92.D.1268
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E92-D
IS - 6
JA - IEICE TRANSACTIONS on Information
Y1 - June 2009
AB - Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
ER -