Establishing and preventing a new replay attack on a non-repudiation protocol

Carla Muntean, Reiner Dojen, Tom Coffey

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Non-repudiation is a security service concerned with preventing a denial by one of the principals involved in a communication about having participated in this communication. In this paper, the Zhou Gollmann non-repudiation protocol is analyzed using an automated logic-based verification engine. As a result of this analysis a weakness in the protocol is discovered. Based on this weakness, a new replay attack on the Zhou Gollmann protocol is presented. In this attack, an intruder can incorrectly convince a principal to have successfully performed a new message exchange. As a consequence, the intruder can impersonate legitimate principals. The weakness leading to the attack is analyzed in detail and amendments to the protocol are proposed that prevent the presented attack. Further, formal verification of the amended protocol provides strong confidence in its correctness and effectiveness.

Original languageEnglish
Title of host publicationProceedings - 2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009
Pages283-290
Number of pages8
DOIs
Publication statusPublished - 2009
Event2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009 - Cluj-Napoca, Romania
Duration: 27 Aug 200929 Aug 2009

Publication series

NameProceedings - 2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009

Conference

Conference2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009
Country/TerritoryRomania
CityCluj-Napoca
Period27/08/0929/08/09

Keywords

  • Fairness
  • Freshness
  • Non-repudiation
  • Replay attack
  • Zhou-Gollmann

Fingerprint

Dive into the research topics of 'Establishing and preventing a new replay attack on a non-repudiation protocol'. Together they form a unique fingerprint.

Cite this