| Download ( PDF | 946kB) Nur für Mitarbeiter des Archivs |
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets
Dresp, Wiebke (2005) Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. In: Dittmann, Jana, (ed.) Communications and Multimedia Security. Lecture Notes in Computer Science, 3677. Springer, Berlin, S. 230-239. ISBN 978-3-540-28791-9.Veröffentlichungsdatum dieses Volltextes: 05 Aug 2009 13:49
Buchkapitel
Zusammenfassung
Wireless communication demands for specialized protocols secure against attacks on the radio path while fitting the limited calculation and memory capabilities of mobile terminals. To ensure accessibility of mobile services beyond a user’s home network, signing on a foreign network should be possible. The latter must be able to authenticate a user without learning any secret registration data. ...
Wireless communication demands for specialized protocols secure against attacks on the radio path while fitting the limited calculation and memory capabilities of mobile terminals. To ensure accessibility of mobile services beyond a user’s home network, signing on a foreign network should be possible. The latter must be able to authenticate a user without learning any secret registration data. Chouinard et al.[DBC01] introduce the Secure Authentication Protocol for this purpose.
In this paper, an exhaustive security analysis of the protocol is presented. First, it is mapped to a coloured petri net. Then, two different intruder models are developed and integrated separately into it. The state spaces of the two nets are calculated; they each contain a set of nodes representing all reachable states. Both are examined to detect states where any security objective is violated indicating a security flaw in the protocol. As there are no such states in both nets, the protocol is proven secure.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Buchkapitel | ||||
| ISBN | 978-3-540-28791-9 | ||||
| Buchtitel: | Communications and Multimedia Security | ||||
|---|---|---|---|---|---|
| Verlag: | Springer | ||||
| Ort der Veröffentlichung: | Berlin | ||||
| Sonstige Reihe: | Lecture Notes in Computer Science | ||||
| Band: | 3677 | ||||
| Seitenbereich: | S. 230-239 | ||||
| Datum | 2005 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Entpflichtete oder im Ruhestand befindliche Professoren > Professur für Wirtschaftsinformatik & Wirtschaftsmathematik (Prof. Dr. Peter Lory) | ||||
| Identifikationsnummer |
| ||||
| Stichwörter / Keywords | Secure Authentication Protocol; Coloured Petri Nets; Formal Protocol Verification; State Space Analysis; Security Analysis | ||||
| Dewey-Dezimal-Klassifikation | 300 Sozialwissenschaften > 330 Wirtschaft | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Unbekannt / Keine Angabe | ||||
| An der Universität Regensburg entstanden | Unbekannt / Keine Angabe | ||||
| Dokumenten-ID | 5148 |
Downloadstatistik
Downloadstatistik