Overcome the Limitation on Authentication Test
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [19]
  • |
  • Related [20]
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    Authentication test is a newly presented method that testifies protocols’ authentication properties. Its proving process is simple and precise; unfortunately it can not analyze protocols with test components multi-encrypted. This paper analyzes the authentication test scheme improved by Perrig and Song and points out its deficiency. Then it proposes an Enhanced Authentication Test theory and proves its soundness in formal. The enhanced authentication test lifts the restriction that test component can not be multi-encrypted in protocol messages, also repairs the inaccuracies in Perrig’s scheme.

    Reference
    [1] Lowe G. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 1995,56(3): 131-136.
    [2] Fabrega FJT, Herzog JC, Guttman JD. Strand space: Why is a security protocol correct. In: Proc. of the 18th IEEE Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1998. 160-171. http://www.mitre.org/work/tech_papers/ tech_papers_00/ guttman_strands/index.html
    [3] Fabrega FJT, Herzog JC, Guttman JD. Strand space: Proving security protocols correct. Journal of Computer Security, 1999,7(2,3): 191-230.
    [4] Fabrega FJT, Herzog JC, Guttman JD. Honest ideals on strand space. In: Proc. of the 11th IEEE Computer Security Foundations Workshop (CSFW). Washington: IEEE Computer Society Press, 1998. 66-77. http://www.mitre.org/work/tech_papers/ tech_papers_00/guttman_honest/index.html
    [5] Guttman JD, Thayer FJ. Authentication tests and the structure of bundles. Theoretical Computer Science, 2002,283(2):333-380.
    [6] Guttman JD, Thayer FJ. Key Compromise, Strand Spaces and the Authentication Tests. In: Proc. of the 17th Conf. on the Mathematical Foundations of Programming Semantics. Elsevier BV, 2001. 141-161.
    [7] Jiang R, Pan L, Li JH. Further analysis of password authentication schemes based on authentication tests. Computer & Security, 2004,23(6):469-477.
    [8] Li XH, Hao LM, Yang ST, Li JH. Formal verification of EAP-AKA with improved authentication tests. In: Proc. of the Int’l Conf. on Wireless Communications, Networking and Mobile Computing. Wuhan, 2006. 1-4. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp? arnumber=4149477
    [9] Guttman JD. Security protocol design via authentication tests. In: Proc. of the 2002 IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 2002. 92-103. http://www.dcs.qmul.ac.uk/~joshuag/pubs/at_design.pdf
    [10] Liu JF, Zhou MT. Designing authentication protocols via authentication test. In: Proc. of the IEEE Symp. on Computers and Communications. Aveiro Portugal: IEEE Computer Society Press, 2007. 475-480. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp? arnumber=4381592
    [11] Jiang R, Hu AQ, Li JH. Research on formal design of ESIKE based on Authentication Tests. Chinese Journal of Computers, 2006,29(9):1694-1701 (in Chinese with English abstract).
    [12] Yang M, Luo JZ. Analysis of security protocols based on authentication test. Journal of Software, 2006,17(1):148-156 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/148.htm
    [13] Li YJ, Pang J. Generalized unsolicited tests for authentication protocol analysis. In: Proc. of the 7th Int’l Conf. on Parallel and Distributed Computing, Applications and Technologies. IEEE Computer Society Press, 2006. 509-514. http://ieeexplore.ieee.org/ xpls/abs_all.jsp?arnumber=4032236
    [14] Liu JF, Zhou MT. Research and improvement on authentication test’s limitation. High Technology Letters, 2008,14(3):266-270.
    [15] Perrig A, Song D. Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement. In: Proc. of the 13th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 2000. 64-76. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=856926
    [16] Song D. Athena: A new efficient automatic checker for security protocol analysis. In: Proc. of the 1999 IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 192-202. http://ieeexplore.ieee.org/iel5/6332/16921/ 00779773.pdf?tp=&arnumber=779773&isnumber=16921
    [17] Song D, Berezin S, Perrig A. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 2001,9(1):47-74
    [18] Clark J, Jacob J. A survey of authentication protocol literature: Version 1.0. University of York, Department of Computer Science, http://www-users.cs.york.ac.uk/~jac/Security Protocols Review
    [19] Lin XJ, Hu SL. Informal methods for the analysis of authentication protocols. Journal of Chinese Computer Systems, 2003,24(11): 1912-1915 (in Chinese with English abstract).
    Cited by
Get Citation

刘家芬,周明天.突破认证测试方法的局限性.软件学报,2009,20(10):2799-2809

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:May 20,2007
  • Revised:March 12,2008
You are the first2043738Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063