A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

被引:3
作者
Zahednejad, Behnam [1 ]
Ke, Lishan [1 ]
Li, Jing [1 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou, Peoples R China
关键词
INTERNET; SCHEME; TOOL;
D O I
10.1155/2020/8848389
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of machine learning in the security analysis of authentication and key agreement protocol was first launched by Ma et al. in 2018. Although they received remarkable results with an accuracy of 72% for the first time, their analysis is limited to replay attack and key confirmation attack. In addition, their suggested framework is based on a multiclassification problem in which every protocol or dataset instance is either secure or prone to a security attack such as replay attack, key confirmation, or other attacks. In this paper, we show that multiclassification is not an appropriate framework for such analysis, since authentication protocols may suffer different attacks simultaneously. Furthermore, we consider more security properties and attacks to analyze protocols against. These properties include strong authentication and Unknown Key Share (UKS) attack, key freshness, key authentication, and password guessing attack. In addition, we propose a much more efficient dataset construction model using a tenth number of features, which improves the solving speed to a large extent. The results indicate that our proposed model outperforms the previous models by at least 10-20 percent in all of the machine learning solving algorithms such that upper-bound performance reaches an accuracy of over 80% in the analysis of all security properties and attacks. Despite the previous models, the classification accuracy of our proposed dataset construction model rises in a rational manner along with the increase of the dataset size.
引用
收藏
页数:15
相关论文
共 39 条
[11]  
Cervesato I., 2001, 16th Annual Symposium on Logic in Computer ScienceLICS, V1, P1
[12]  
Chen T., 2015, R PACKAGE VERSION 04
[13]   ON THE SECURITY OF RECENT PROTOCOLS [J].
CLARK, J ;
JACOB, J .
INFORMATION PROCESSING LETTERS, 1995, 56 (03) :151-155
[14]   THE DATA ENCRYPTION STANDARD (DES) AND ITS STRENGTH AGAINST ATTACKS [J].
COOPERSMITH, D .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1994, 38 (03) :243-250
[15]  
Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
[16]   TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536
[17]  
Dierks T., 2008, The transport layer security (TLS) protocol version, DOI DOI 10.17487/RFC5246
[18]   Strand spaces: Why is a security protocol correct? [J].
Fabrega, FJT ;
Herzog, JC ;
Guttman, JD .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :160-171
[19]   Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning [J].
Gohr, Aron .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 :150-179
[20]   Authentication by correspondence [J].
Gollmann, D .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) :88-95