Verification of Trusted Network Access Protocols in the Strand Space Model

Yuelei XIAO  Yumin WANG  Liaojun PANG  

Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E95-A   No.3   pp.665-668
Publication Date: 2012/03/01
Online ISSN: 1745-1337
DOI: 10.1587/transfun.E95.A.665
Print ISSN: 0916-8508
Type of Manuscript: LETTER
Category: Cryptography and Information Security
Keyword: 
trusted network access,  Strand Space Model,  internal penetrator,  

Full Text: PDF(146.6KB)>>
Buy this Article




Summary: 
Trusted network access protocols are proposed for the security and authorization of network-access requests. Because they differ greatly from traditional security protocols on security demands, they can not be analyzed with previous strand space works directly. To solve this problem, we first give some extensions necessary to verify them in this letter. Moreover, we point out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM), and then improve the MN-TAP protocol and show that the improved MN-TAP protocol is secure in the SSM.