A Formal Description and Verification of Authentication Protocol

被引:0
|
作者
Yuan, Zhanting [1 ]
Kang, Xu [1 ]
Zhang, Qiuyu [1 ]
Liang, Shuang [1 ]
机构
[1] Lanzhou Univ Technol, Coll Comp & Commun, Lanzhou 730050, Gansu, Peoples R China
来源
DCABES 2008 PROCEEDINGS, VOLS I AND II | 2008年
关键词
Identity Authentication Protocol; Petri Net; Reachable Tree; Reachable Analysis; Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity authentication, as the first step to realize the network security, is the key technology for secure exchange of the online commercial information. Moreover, if there is any leak in the authentication protocol, secret information will leak out consequentially. It is necessary to adopt some formalized method to describe and prove the authentication protocol. In this paper the colored Petri. Net is employed to describe the authentication protocol, and simultaneously the combined strategy of 1-reachable analysis and conversing analysis has been put forward to verify the security of this authentication protocol.
引用
收藏
页码:735 / 740
页数:6
相关论文
共 50 条
  • [1] Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID
    Li, Wei
    Xiao, Meihua
    Li, Yanan
    Mei, Yingtian
    Zhong, Xiaomei
    Tu, Jimin
    THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 119 - 132
  • [2] Formal Analysis and Verification for Three-Party Authentication Protocol of RFID
    Chen, Jia
    Xiao, Meihua
    Yang, Ke
    Li, Wei
    Zhong, Xiaomei
    THEORETICAL COMPUTER SCIENCE (NCTCS 2018), 2018, 882 : 46 - 60
  • [3] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Woo-Sik, Bae
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2595 - 2609
  • [4] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol
    Edris, Ed Kamya Kiyemba
    Aiash, Mandi
    Loo, Jonathan Kok-Keng
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
  • [5] Formal Verification of the xDAuth Protocol
    Alam, Quratulain
    Tabbasum, Saher
    Malik, Saif U. R.
    Alam, Masoom
    Ali, Tamleek
    Akhunzada, Adnan
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Buyya, Rajkumar
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 1956 - 1969
  • [6] FORMAL ANALYSIS OF A NOVEL RFID AUTHENTICATION PROTOCOL
    Chikouche, Noureddine
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [7] Formal Verification of a Secure Mobile Banking Protocol
    Huy Hoang Ngo
    Dandash, Osama
    Phu Dung Le
    Srinivasan, Bala
    Wilson, Campbell
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 410 - 421
  • [8] Design and formal verification of a CEM protocol with transparent TTP
    Liu, Zhiyuan
    Pang, Jun
    Zhang, Chenyi
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (02) : 279 - 297
  • [9] Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
    AL-Saraireh, Ja'afer M.
    Saraireh, Mohammad S.
    Saraireh, Saleh S.
    Al Nabhan, Mohammad M.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 86 - 92
  • [10] Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices
    Lu, Bo
    Cao, Ruohan
    Lu, Yueming
    Luo, Xueting
    IEEE ACCESS, 2019, 7 : 97771 - 97783