The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Le protocole de sécurité assure la sécurité des communications sur Internet. L'une de ses caractéristiques importantes est l'authentification avec échange de clés. Son exactitude est une exigence de l'ensemble de la sécurité des communications. Dans cet article, nous présentons trois modèles d'attaque réalisés comme leurs scénarios d'attaque, et fournissons un vérificateur de protocole d'authentification pour appliquer trois scénarios d'attaque basés sur les modèles. Nous l'utilisons également pour vérifier deux protocoles de sécurité populaires : Secure SHell (SSH) et Secure Socket Layer/Transport Layer Security (SSL/TLS).
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Takamichi SAITO, "A Scenario-Based Protocol Checker for Public-Key Authentication Scheme" in IEICE TRANSACTIONS on Information,
vol. E92-D, no. 6, pp. 1268-1279, June 2009, doi: 10.1587/transinf.E92.D.1268.
Abstract: Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E92.D.1268/_p
Copier
@ARTICLE{e92-d_6_1268,
author={Takamichi SAITO, },
journal={IEICE TRANSACTIONS on Information},
title={A Scenario-Based Protocol Checker for Public-Key Authentication Scheme},
year={2009},
volume={E92-D},
number={6},
pages={1268-1279},
abstract={Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).},
keywords={},
doi={10.1587/transinf.E92.D.1268},
ISSN={1745-1361},
month={June},}
Copier
TY - JOUR
TI - A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
T2 - IEICE TRANSACTIONS on Information
SP - 1268
EP - 1279
AU - Takamichi SAITO
PY - 2009
DO - 10.1587/transinf.E92.D.1268
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E92-D
IS - 6
JA - IEICE TRANSACTIONS on Information
Y1 - June 2009
AB - Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
ER -