Web security: Authentication protocols and their analysis

被引:0
|
作者
Wu Wen
Fumio Mizoguchi
机构
[1] Science University of Tokyo,
来源
New Generation Computing | 2001年 / 19卷
关键词
Internet Security; Authentication Protocol; Security Protocol Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Authentication is one of the basic building blocks of computer security. It is achieved through the execution of an authentication protocol between two or more parties. One such protocol, the Secure Socket Layer (SSL) protocol, has become the de facto standard for Web security. This paper provides an overview of results and methods used in analyzing authentication protocols. The aim is to provide a bird’s eye view of the assumptions, methods, and results that are available for anyone who is interested in designing new security protocols or applying a new analysis approach. A detailed description of the SSL handshake protocol as well as how changes in environment assumption can lead to unexpected consequences, is provided. A fix to the weakness is also described.
引用
收藏
页码:283 / 299
页数:16
相关论文
共 50 条
  • [31] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [32] Scalability and Security Conflict for RFID Authentication Protocols
    Imran Erguler
    Emin Anarim
    Wireless Personal Communications, 2011, 59 : 43 - 56
  • [33] Overview security analysis of 3G authentication protocols and technical specifications
    Cao, Chenlei
    Zhang, Ru
    Niu, Xinxin
    Zhou, Linna
    Zhang, Zhentao
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2193 - 2199
  • [34] Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protocols
    Muhammad, Shahabuddin
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 214 - 228
  • [35] Security Enhanced RFID Authentication Protocols for Healthcare Environment
    Xie, Shaohao
    Zhang, Fangguo
    Cheng, Rong
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) : 71 - 86
  • [36] Security Flaws in Authentication Protocols with Anonymity for Wireless Environments
    Xu, Jing
    Feng, Dengguo
    ETRI JOURNAL, 2009, 31 (04) : 460 - 462
  • [37] Security of public key certificate based authentication protocols
    Wen, W
    Saito, T
    Mizoguchi, F
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 196 - 209
  • [38] A review of authentication protocols for rfid security on smart healthcare
    Dearfian, Hanif Restu
    Amiruddin, Amiruddin
    TARUMANAGARA INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF TECHNOLOGY AND ENGINEERING, 2019, 508
  • [39] Compositional analysis of authentication protocols
    Bugliesi, M
    Focardi, R
    Maffei, M
    PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 140 - 154
  • [40] RFID Mutual Authentication Protocols with Universally Composable Security
    Su, Chunhua
    Li, Yingjiu
    Deng, Robert H.
    RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 35 - 49