A Formal Description and Verification of Authentication Protocol

被引:0
作者
Yuan, Zhanting [1 ]
Kang, Xu [1 ]
Zhang, Qiuyu [1 ]
Liang, Shuang [1 ]
机构
[1] Lanzhou Univ Technol, Coll Comp & Commun, Lanzhou 730050, Gansu, Peoples R China
来源
DCABES 2008 PROCEEDINGS, VOLS I AND II | 2008年
关键词
Identity Authentication Protocol; Petri Net; Reachable Tree; Reachable Analysis; Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity authentication, as the first step to realize the network security, is the key technology for secure exchange of the online commercial information. Moreover, if there is any leak in the authentication protocol, secret information will leak out consequentially. It is necessary to adopt some formalized method to describe and prove the authentication protocol. In this paper the colored Petri. Net is employed to describe the authentication protocol, and simultaneously the combined strategy of 1-reachable analysis and conversing analysis has been put forward to verify the security of this authentication protocol.
引用
收藏
页码:735 / 740
页数:6
相关论文
共 50 条
[31]   Formal Modelling of PKI Based Authentication [J].
Haidar, Ali Nasrat ;
Abdallah, Ali E. .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 235 (0C) :55-70
[32]   Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model [J].
Xiao, Yuelei ;
Gao, Shan .
ELECTRONICS, 2022, 11 (09)
[33]   Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress [J].
Tounsi, Wiem ;
Cuppens-Boulahia, Nora ;
Cuppens, Frederic ;
Garcia-Alfaro, Joaquin .
FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 :242-251
[34]   Lightweight authentication protocol (LAP) [J].
Chousiadis, C ;
Pangalos, G .
6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, :7-12
[35]   Cryptanalysis of a User Authentication Protocol [J].
Tan, Zuowen .
2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, :27-30
[36]   Robust Deniable Authentication Protocol [J].
Yoon, Eun-Jun ;
Yoo, Kee-Young ;
Yeo, Sang-Soo ;
Lee, Changhoon .
WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) :81-90
[37]   Robust Deniable Authentication Protocol [J].
Eun-Jun Yoon ;
Kee-Young Yoo ;
Sang-Soo Yeo ;
Changhoon Lee .
Wireless Personal Communications, 2010, 55 :81-90
[38]   On a Lightweight Authentication Protocol for RFID [J].
Nastase, George-Daniel ;
Tiplea, Ferucio Laurentiu .
INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 :212-225
[39]   AHA-BV: Access and handover authentication protocol with batch verification for satellite-terrestrial integrated networks [J].
Guo, Junyan ;
Chang, Liyuan ;
Song, Yue ;
Yao, Shuang ;
Zheng, Zhi ;
Hao, Yihang ;
Zhu, Shixuan ;
Guo, Wei ;
Zhao, Ming .
COMPUTER STANDARDS & INTERFACES, 2025, 91
[40]   Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif [J].
Edris, Ed Kamya Kiyemba ;
Aiash, Mahdi ;
Loo, Jonathan .
ELECTRONICS, 2021, 10 (13)