Establishing and fixing a freshness flaw in a key-distribution and authentication protocol

Reiner Dojen, Ioana Lasc, Tom Coffey

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The security of electronic networks and information systems is nowadays seen as a critical issue for the growth of Information and Communication Technologies. Cryptographic protocols are used to provide security services such as confidentiality, message integrity, authentication, certified E-mail and non-repudiation. Traditionally, security protocols have been designed and verified using informal techniques. However, the absence of formal verification can lead to security errors remaining undetected. Formal verification techniques provide a systematic way of discovering protocol flaws. This paper establishes a freshness flaw in a keydistribution and Authentication Protocol using an automated logic-based verification engine. The performed verification reveals a freshness flaw in the protocol that allows an intruder to impersonate legitimate principals. The cause of the freshness flaw is discussed and an amended protocol is proposed. Formal verification of the amended protocol provides confidence in the correctness and effectiveness of the proposed modifications.

Original languageEnglish
Title of host publicationProceedings - 2008 IEEE 4th International Conference on Intelligent Computer Communication and Processing, ICCP 2008
Pages185-192
Number of pages8
DOIs
Publication statusPublished - 2008
Event2008 IEEE 4th International Conference on Intelligent Computer Communication and Processing, ICCP 2008 - Cluj-Napoca, Romania
Duration: 28 Aug 200830 Aug 2008

Publication series

NameProceedings - 2008 IEEE 4th International Conference on Intelligent Computer Communication and Processing, ICCP 2008

Conference

Conference2008 IEEE 4th International Conference on Intelligent Computer Communication and Processing, ICCP 2008
Country/TerritoryRomania
CityCluj-Napoca
Period28/08/0830/08/08

Fingerprint

Dive into the research topics of 'Establishing and fixing a freshness flaw in a key-distribution and authentication protocol'. Together they form a unique fingerprint.

Cite this