Publication IEICE TRANSACTIONS on Information and SystemsVol.E92-DNo.6pp.1268-1279 Publication Date: 2009/06/01 Online ISSN: 1745-1361 DOI: 10.1587/transinf.E92.D.1268 Print ISSN: 0916-8532 Type of Manuscript: PAPER Category: Application Information Security Keyword: security protocol, authentication protocol, protocol analysis,
Full Text: PDF(287.4KB)>>
Summary: Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).