Web security: Authentication protocols and their analysis

被引:0
|
作者
Wu Wen
Fumio Mizoguchi
机构
[1] Science University of Tokyo,
来源
New Generation Computing | 2001年 / 19卷
关键词
Internet Security; Authentication Protocol; Security Protocol Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Authentication is one of the basic building blocks of computer security. It is achieved through the execution of an authentication protocol between two or more parties. One such protocol, the Secure Socket Layer (SSL) protocol, has become the de facto standard for Web security. This paper provides an overview of results and methods used in analyzing authentication protocols. The aim is to provide a bird’s eye view of the assumptions, methods, and results that are available for anyone who is interested in designing new security protocols or applying a new analysis approach. A detailed description of the SSL handshake protocol as well as how changes in environment assumption can lead to unexpected consequences, is provided. A fix to the weakness is also described.
引用
收藏
页码:283 / 299
页数:16
相关论文
共 50 条
  • [11] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [12] Security analysis of two recently proposed RFID authentication protocols
    Lv, Chao
    Li, Hui
    Ma, Jianfeng
    Zhao, Meng
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (03): : 335 - 340
  • [13] Security analysis of two recently proposed RFID authentication protocols
    Chao Lv
    Hui Li
    Jianfeng Ma
    Meng Zhao
    Frontiers of Computer Science in China, 2011, 5 : 335 - 340
  • [14] Security analysis and application of Chebyshev Chaotic map in the authentication protocols
    Dharminder D.
    Gupta P.
    Dharminder, Dharminder (manndharminder999@gmail.com), 1600, Taylor and Francis Ltd. (43): : 1095 - 1103
  • [15] Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
    Siddiqui, Zeeshan
    Tayan, Omar
    Khan, Muhammad Khurram
    IEEE ACCESS, 2018, 6 : 34527 - 34542
  • [16] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [17] Security of lightweight mutual authentication protocols
    Tu, Yu-Ju
    Kapoor, Gaurav
    Piramuthu, Selwyn
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 4565 - 4581
  • [18] Security of lightweight mutual authentication protocols
    Yu-Ju Tu
    Gaurav Kapoor
    Selwyn Piramuthu
    The Journal of Supercomputing, 2021, 77 : 4565 - 4581
  • [19] Formal Reasoning on Authentication in Security Protocols
    Fattahi, Jaouhar
    Mejri, Mohamed
    Ghayoula, Ridha
    Pricop, Emil
    2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 282 - 289
  • [20] On the security of some password authentication protocols
    Hsieh, BT
    Sun, HM
    Hwang, T
    INFORMATICA, 2003, 14 (02) : 195 - 204