详细信息
Security analysis and improvement of Yahalom protocol ( CPCI-S收录 EI收录)
文献类型:会议论文
英文题名:Security analysis and improvement of Yahalom protocol
作者:Chen, Li[1,2];Shi, Mingxia[3]
第一作者:Chen, Li;陈莉
通讯作者:Chen, L[1]
机构:[1]Henan Univ Finance & Econ, Ctr Comp, Zhengzhou 450002, Henan, Peoples R China;[2]Informat Engn Univ, Dept Network Engn, Henan 450002, Peoples R China;[3]Henan Light Ind Training Coll, Basic Course Dept, Henan 450002, Peoples R China
第一机构:河南财经政法大学
通讯机构:[1]corresponding author), Henan Univ Finance & Econ, Ctr Comp, Zhengzhou 450002, Henan, Peoples R China.|[10484]河南财经政法大学;
会议论文集:3rd IEEE Conference on Industrial Electronics and Applications (ICIEA 2008)
会议日期:JUN 03-05, 2008
会议地点:Singapore, SINGAPORE
语种:英文
外文关键词:Authentication - Computer circuits - Formal methods - Industrial electronics
摘要:Logic-based formal analysis methods are the efficient methods for analyzing the security of cryptography protocols. The paper analyzes the security of the Yahalom protocol by employing the formal method SVO logic and finds that the protocol does not achieve the authentication goals. By modifying message format and adding handshake message, the paper also proposes a novel improved Yahalom protocol, which removes the limitations that the original Yahalom protocol cannot against the reply attack and the BAN-Yahalom protocol cannot resist impersonation attack. The analysis results of the improved Yahalom protocol reveal that the protocol completes the strong goals of identity authentication and key negotiation.
参考文献:
正在载入数据...