Noteson‘A SimpleLogicfor Authentication Protocol Design'
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Buttyan et al. proposed a simple logic and used it to revise Woo Lam protocol; without proving, they claimed that revised protocol is resistant against the interaction attacks between a protocol and itself. In this paper, in order to show that their results are incorrect, two different attacks on revised protocol are found out and set out in detail for their implementations. The fashions to construct the two attacks are essentially analogous to the ones described by Debbabi etc. except more complicated than them,The further analysis show that the logic of Buttyan etc.has no enough capacity to sufficiently capture protocol flaws,which stem from interaction of protocol itself.This logic needs to be improved.

    Reference
    Related
    Cited by
Get Citation

季庆光,冯登国.关于“为设计认证协议的一个简明逻辑”一文的注记.软件学报,2001,12(11):1581-1585

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:
  • Revised:
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063