2020
DOI: 10.1007/978-3-030-62077-6_9
|View full text |Cite
|
Sign up to set email alerts
|

Formal Methods Analysis of the Secure Remote Password Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…To avoid dictionary attacks, Qerberos includes an alternative authentication method in which the Secure Remote Password (SRP) [4], [16], [17] algorithm is used. With SRP, clients can authenticate themselves without ever revealing their password to the authentication server.…”
Section: B Srpmentioning
confidence: 99%
“…To avoid dictionary attacks, Qerberos includes an alternative authentication method in which the Secure Remote Password (SRP) [4], [16], [17] algorithm is used. With SRP, clients can authenticate themselves without ever revealing their password to the authentication server.…”
Section: B Srpmentioning
confidence: 99%
“…The SRP-6a protocol does not have a proof model for security. Recently, a formal analysis of SRP was introduced in [ 63 ]. The authors analyzed SRP-3 using a cryptographic protocol shape analyzer (CPSA).…”
Section: Security Analysis Of Srpmentioning
confidence: 99%
“…Open problems include: (1) Formally state and prove the security properties of AOT, and (2) perform a formal-methods analysis of the AOT protocol using a protocol-analysis tool such as CPSA [62].…”
Section: Open Problemsmentioning
confidence: 99%