Upgrading the S-NCI Key Establishment Protocol Scheme to be Secure and Applicable

被引:1
作者
Budiyanto, Setiyo [1 ]
Santosa, Galih Bangun [2 ]
Mariati, Fajar Rahayu Ikhwannul [1 ]
机构
[1] Mercu Buana Univ, Dept Elect Engn, Jakarta, Indonesia
[2] Natl Crypto Inst, Bogor, Indonesia
来源
INTERNATIONAL CONFERENCE ON DESIGN, ENGINEERING AND COMPUTER SCIENCES | 2018年 / 453卷
关键词
D O I
10.1088/1757-899X/453/1/012002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are currently a number of key establishment protocols that have been developed with server based as trusted third parties. However, there are still some attacks that may occur in the protocols are man-in-the-middle attack, replay attack, typing attack, and modification attack. Following this, S-NCI's key establishment protocol has been developed which claims to be immune to man-in-the-middle attacks, replay attacks, typing attacks, and modification attacks. However, the protocol has not been through formal analysis. Then, based on experiments that have been done in this study, S-NCI has not met the formal analysis criteria of Alive and Weakaggree. In addition, S-NCI also has not provided an applicable supporting procedure for the utilization of Key Translation Center that is realized until now no one has applied. The research method used in this research is a research library supported by experimenting formal analysis of protocols using Scyther Tool. This research has produced a procedure supporting the application of S-NCI protocol along with the result of modification of the protocol so that it can fulfill Alive and Weakagree criteria.
引用
收藏
页数:9
相关论文
共 15 条
[1]  
Activities P., CAS CREMERS
[2]  
[Anonymous], J NETWORK SECURITY
[3]  
Asvial Muhammad, 2014, 2014 IEEE Symposium on Wireless Technology and Applications (ISWTA), P36, DOI 10.1109/ISWTA.2014.6981191
[4]  
Budiyanto S., 2017, NEW MODEL GENETIC ZO, V15, P598
[5]   Performance Analysis of Genetic Zone Routing Protocol Combined With Vertical Handover Algorithm for 3G-WiFi Offload [J].
Budiyanto, Setiyo ;
Asvial, Muhammad ;
Gunawan, Dadang .
JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2014, 8 (01) :49-63
[6]  
Colin B., 2003, INFORM SECURITY CRYP
[7]  
Cremers C.J. F., 2006, Scyther: Unbounded Verification of Security Protocols, P1
[8]  
Dalai Nitish, 2010, International Journal of Communications, Networks and System Sciences, V3, P779, DOI 10.4236/ijcns.2010.310104
[9]   TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536
[10]  
Mao W., 1995, P 4 IMA C CRYPT COD