A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

Takamichi SAITO

IEICE TRANSACTIONS on Information and Systems   Vol.E92-D    No.6    pp.1268-1279
Publication Date: 2009/06/01
Online ISSN: 1745-1361
DOI: 10.1587/transinf.E92.D.1268
Print ISSN: 0916-8532
Type of Manuscript: PAPER
Category: Application Information Security
security protocol,  authentication protocol,  protocol analysis,  

Full Text: PDF(287.4KB)>>
Buy this Article

Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

open access publishing via