JAIST Repository >
School of Information Science >
JAIST Research Reports >
Research Report - School of Information Science : ISSN 0918-7553 >
IS-RR-2008 >
Please use this identifier to cite or link to this item:
http://hdl.handle.net/10119/4748
|
Title: | Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol |
Authors: | Li, Guoqiang Ogawa, Mizuhito |
Issue Date: | 2008-07-25 |
Publisher: | 北陸先端科学技術大学院大学情報科学研究科 |
Magazine name: | Research report (School of Information Science, Japan Advanced Institute of Science and Technology) |
Volume: | IS-RR-2008-002 |
Start page: | 1 |
End page: | 22 |
Abstract: | Authentication and secrecy have been widely investigeted in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus on the concepts of corresponding assertion and key distribution. This paper proposes an on-the-fly model checking method based on the pushdown system to verify the authentication of recursive protocols with an unbounded number of principals. By experiments of the Maude implementation, we find the recursive authentication protocol, which was verified in the sense of (weak) key distribution, has a flaw in the sense of correspondence assertion. |
URI: | http://hdl.handle.net/10119/4748 |
Material Type: | publisher |
Appears in Collections: | IS-RR-2008
|
Files in This Item:
File |
Description |
Size | Format |
105-1.pdf | | 259Kb | Adobe PDF | View/Open |
|
All items in DSpace are protected by copyright, with all rights reserved.
|