Web security: Authentication protocols and their analysis

被引:0
|
作者
Wu Wen
Fumio Mizoguchi
机构
[1] Science University of Tokyo,
来源
New Generation Computing | 2001年 / 19卷
关键词
Internet Security; Authentication Protocol; Security Protocol Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Authentication is one of the basic building blocks of computer security. It is achieved through the execution of an authentication protocol between two or more parties. One such protocol, the Secure Socket Layer (SSL) protocol, has become the de facto standard for Web security. This paper provides an overview of results and methods used in analyzing authentication protocols. The aim is to provide a bird’s eye view of the assumptions, methods, and results that are available for anyone who is interested in designing new security protocols or applying a new analysis approach. A detailed description of the SSL handshake protocol as well as how changes in environment assumption can lead to unexpected consequences, is provided. A fix to the weakness is also described.
引用
收藏
页码:283 / 299
页数:16
相关论文
共 50 条
  • [1] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [2] Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols
    Wang, Kailong
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 : 441 - 445
  • [3] VANET authentication protocols: security analysis and a proposal
    Piramuthu, Otto B.
    Caesar, Matthew
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (02): : 2153 - 2179
  • [4] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [5] VANET authentication protocols: security analysis and a proposal
    Otto B. Piramuthu
    Matthew Caesar
    The Journal of Supercomputing, 2023, 79 : 2153 - 2179
  • [6] Security Analysis of ECC Based Authentication Protocols
    Khatwani, Chanchal
    Roy, Swapnoneel
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1167 - 1172
  • [7] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [8] Security Analysis and Improvement on Two RFID Authentication Protocols
    Shaohui Wang
    Sujuan Liu
    Danwei Chen
    Wireless Personal Communications, 2015, 82 : 21 - 33
  • [9] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
  • [10] Security Analysis and Improvement on Two RFID Authentication Protocols
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (01) : 21 - 33