2014
DOI: 10.1007/978-3-319-14054-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Computationally Analyzing the ISO 9798–2.4 Authentication Protocol

Abstract: Abstract. We provide a computational analysis of the ISO 9798-2.4 mutual authentication standard protocol in the model of Bellare and Rogaway. In contrast to typical analyses of standardized protocols, we include the optional data fields specified in the standard by applying the framework of Rogaway and Stegers. To our knowledge this is the first application of the Rogaway-Stegers technique in a standardized protocol. As well as a precise definition of the computational security properties achieved by the prot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 13 publications
0
0
0
Order By: Relevance