Establishing and Preventing a New Replay Attack on a Non-Repudiation Protocol

被引:2
|
作者
Muntean, Carla [1 ]
Dojen, Reiner [1 ]
Coffey, Tom [1 ]
机构
[1] Univ Limerick, Dept Elect & Comp Engn, Limerick, Ireland
来源
2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS | 2009年
关键词
Non-repudiation; fairness; replay attack; Zhou-Gollmann; freshness; LOGIC;
D O I
10.1109/ICCP.2009.5284749
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Non-repudiation is a security service concerned with preventing a denial by one of the principals involved in a communication about having participated in this communication. In this paper, the Zhou Gollmann non-repudiation protocol is analyzed using an automated logic-based verification engine. As a result of this analysis a weakness in the protocol is discovered. Based on this weakness, a new replay attack on the Zhou Gollmann protocol is presented. In this attack, an intruder can incorrectly convince a principal to have successfully performed a new message exchange. As a consequence, the intruder can impersonate legitimate principals. The weakness leading to the attack is analyzed in detail and amendments to the protocol are proposed that prevent the presented attack Further, formal verification of the amended protocol provides strong confidence in its correctness and effectiveness.
引用
收藏
页码:283 / 290
页数:8
相关论文
共 50 条
  • [1] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [2] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
  • [3] A Fair Non-Repudiation Protocol
    Meng, B. (mengbo@263.net.cn), FAPERJ; SBC; UFRI; IEEE; COPPETEC FUNDACAO (Institute of Electrical and Electronics Engineers Inc.):
  • [4] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [5] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [6] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [7] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
  • [8] A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
    蒋晓宁
    叶澄清
    Journal of Zhejiang University Science, 2000, (03) : 80 - 84
  • [9] Formal analysis of a non-repudiation protocol
    Schneider, S
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [10] Improvement of a fair non-repudiation protocol
    Wen, Jinghua
    Liang, Min
    Yang, Zirong
    Li, Xiang
    PROCEEDINGS OF E-ENGDET2006, 2006, : 70 - 74