1993
DOI: 10.1109/49.223869
|View full text |Cite
|
Sign up to set email alerts
|

Systematic design of a family of attack-resistant authentication protocols

Abstract: The pervasive use of open networks and distributed systems poses serious threats to the security of end-to-end communications and network components themselves. A necessary foundation for securing a network is the ability to reliably authenticate communication partners and other network entities. One-way, password-based authentication techniques are not sufficient to cope with the issues at hand. Modern designs rely on two-way, cryptographic authentication protocols. However, most existing designs suffer from … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2002
2002
2019
2019

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 121 publications
(40 citation statements)
references
References 14 publications
0
40
0
Order By: Relevance
“…As an idea for protocol design, it goes back at least to Bird et al [7]. In a key special case, "protocol composition," it dates from the 1990s [41, e.g.].…”
Section: Resultsmentioning
confidence: 99%
“…As an idea for protocol design, it goes back at least to Bird et al [7]. In a key special case, "protocol composition," it dates from the 1990s [41, e.g.].…”
Section: Resultsmentioning
confidence: 99%
“…In several cases, this is due to an intruder launching a mirror attack, simply reflecting an agent's messages back at himself; examples appear in [2]. In other, more subtle attacks, an intruder attacks an agent by using a second run of a protocol with the same agent , so as to use the second run as an oracle; for example the attack on the BAN version of the Yahalom protocol [3] in [24].…”
Section: Definition 21 (Aliveness)mentioning
confidence: 99%
“…The safe protocol transformation problem is not new. As an idea for protocol design, it goes back at least to Bird et al [5]. In a key special case, "protocol composition," it dates from the 1990s [21, e.g.].…”
Section: Preserving Security Goal Formulasmentioning
confidence: 99%