SG logic - A formal analysis technique for authentication protocols

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security of electronic communication relies to a great extent on the security of authentication protocols used to distribute cryptographic keys. Hence formal techniques are needed which help to analyse the security of these protocols. In this paper we introduce a formal method which allows to detect the possibility of certain replay and interleaving attacks. By using our method we are able to show the weakness of the Neuman-Stubblebine protocol and to detect inaccuracies in some authentication protocols standardized in ISO. These inaccuracies may cause the protocol to allow interleaving attacks in certain environments, a fact which seems to be unrecognized so far.

Cite

CITATION STYLE

APA

Gürgens, S. (1998). SG logic - A formal analysis technique for authentication protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1361, pp. 159–176). Springer Verlag. https://doi.org/10.1007/bfb0028167

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free