Filters








6,262 Hits in 9.9 sec

Security Analysis of Out-of-Band Device Pairing Protocols: A Survey

Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien, Qi Jiang
2021 Wireless Communications and Mobile Computing  
Furthermore, it provides a realistic abstraction of the adversary capabilities on the out-of-band channel which improves the modeling of their security characteristics in the protocol verification tools  ...  Also, we propose a classification of a number of out-of-band channels based on their security properties and under our refined adversary model.  ...  Acknowledgments This work was supported by the SEIDO LAB (the joint research laboratory for Security and Internet of Things between EDF R&D and Télécom Paris).  ... 
doi:10.1155/2021/8887472 fatcat:opktciso2ncynne2qutnuubleq

Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis [chapter]

Colin Boyd, Kapali Viswanathan
2003 Lecture Notes in Computer Science  
We propose a way to unify two approaches to analysis of protocol security, namely complexity theoretic cryptographic analysis and formal specification with machine analysis.  ...  We present a specification in Sum of the Bellare-Rogaway cryptographic model and demonstrate its use with a specification of a protocol of Jakobsson and Pointcheval.  ...  Although the above definition appears to be concerned only with key confidentiality it does imply key authentication.  ... 
doi:10.1007/978-3-540-40981-6_6 fatcat:regd7xdndbb5nb2lfjit63ern4

Verifying Parameterized Timed Security Protocols [chapter]

Li Li, Jun Sun, Yang Liu, Jin Song Dong
2015 Lecture Notes in Computer Science  
In our previous work, we proposed an approach to check the correctness of the timed authentication in security protocols with fixed timing constraints.  ...  The correctness of our algorithm is formally proved. We implement our method into a tool called PTAuth and evaluate it with several security protocols.  ...  They, denoted as R init , represent the capabilities of the adversary in the protocol. Adversary Model.  ... 
doi:10.1007/978-3-319-19249-9_22 fatcat:wprknliywvhc3p7fwdowevdrce

Modeling and Analyzing Security in the Presence of Compromising Adversaries [chapter]

David Basin, Cas Cremers
2010 Lecture Notes in Computer Science  
Our adversary models unify and generalize many existing security notions from both the computational and symbolic settings.  ...  impersonation, and adversaries capable of state-reveal queries.  ...  The MQV protocol family [24, 27, 33] is a class of authenticated key-exchange protocols designed to provide strong security guarantees.  ... 
doi:10.1007/978-3-642-15497-3_21 fatcat:ci4igjxn7fdpdoug6ddroix32y

Just fast keying

William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
2004 ACM Transactions on Privacy and Security  
We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture.  ...  It is simple, efficient, and secure; we sketch a proof of the latter property.  ...  On top of its usual capabilities in the SK model, we provide the adversary with a new capability: At any time during the computation, the adversary can activate a new AFS phase in a host of its choosing  ... 
doi:10.1145/996943.996946 fatcat:6lmsda5cjzaepbftzgzwowplci

Quantum Key Distribution in the Classical Authenticated Key Exchange Framework [article]

Michele Mosca and Douglas Stebila and Berkant Ustaoglu
2012 arXiv   pre-print
We describe a security model for quantum key distribution based on traditional classical authenticated key exchange (AKE) security models.  ...  Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary.  ...  IQC and Perimeter Institute are supported in part by the Government of Canada and the Province of Ontario.  ... 
arXiv:1206.6150v1 fatcat:vrjks6glnvdrxjqmaiiptkvhoe

Quantum Key Distribution in the Classical Authenticated Key Exchange Framework [chapter]

Michele Mosca, Douglas Stebila, Berkant Ustaoğlu
2013 Lecture Notes in Computer Science  
We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models.  ...  Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary.  ...  IQC and Perimeter Institute are supported in part by the Government of Canada and the Province of Ontario.  ... 
doi:10.1007/978-3-642-38616-9_9 fatcat:l4gnur73xbbmzozlnt5lluk4zy

Secure Computation Without Authentication

Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
2010 Journal of Cryptology  
key exchange and non-malleable commitments. notion of security guarantees that the adversary is limited to pursuing one of the two following strategies:  ...  In this model, it is not possible to achieve the same level of security as in the authenticated-channel setting. Nevertheless, we show that meaningful security guarantees can be provided.  ...  Thus, the problem of securely computing sF is exactly the problem of obtaining secure password-based authenticated key exchange.  ... 
doi:10.1007/s00145-010-9075-9 fatcat:tauep6n2l5arznefrlw4lpr37e

Secure Computation Without Authentication [chapter]

Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
2005 Lecture Notes in Computer Science  
key exchange and non-malleable commitments. notion of security guarantees that the adversary is limited to pursuing one of the two following strategies:  ...  In this model, it is not possible to achieve the same level of security as in the authenticated-channel setting. Nevertheless, we show that meaningful security guarantees can be provided.  ...  Thus, the problem of securely computing sF is exactly the problem of obtaining secure password-based authenticated key exchange.  ... 
doi:10.1007/11535218_22 fatcat:oqgl7ju5prbahlunail2kfs2zy

A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions [chapter]

Süleyman Kardaş, Mehmet Sabir Kiraz, Muhammed Ali Bingöl, Hüseyin Demirci
2012 Lecture Notes in Computer Science  
We show that the security of Sadeghi et al.'s PUF based authentication protocol is not secure in this model. We provide a new technique to improve the security of their protocol.  ...  Motivated by this need, we first introduce a strong adversary model for Physically Unclonable Functions (PUFs) based authentication protocol in which the adversary has access to volatile memory of the  ...  Acknowledgment We thank anonymous referees for valuable comments on a previous version of this paper. This work has been partially funded by FP7-Project ICE under the grant agreement number 206546.  ... 
doi:10.1007/978-3-642-25286-0_6 fatcat:d7of7ql3rzbovmlkf4ku5cihby

Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication

Run Zhang, WenAn Zhou, Huamiao Hu
2021 Security and Communication Networks  
And then, we model UE and AMF into two synchronous communication finite-state machines, extract the desired properties from 3GPP relevant specifications, and construct an adversary model to test the system's  ...  Compared with the LTE network, 5G brings up many new security features and possesses more sophisticated and robust security mechanisms, while there are still many potential security issues with the 5G  ...  Acknowledgments is work was supported by the Key Laboratory Fund (Grant no. 6142106200103).  ... 
doi:10.1155/2021/4498324 doaj:58d8246beaea4deab6a911f6caf0eaf8 fatcat:btrhumkr5zdq3p43nmfioysx7q

Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network

Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Kok-Keng Loo
2020 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)  
An open access repository of Middlesex University research http://eprints.mdx.ac.uk Edris, Ed Kamya Kiyemba, Aiash, Mahdi ORCID: https://orcid.org/0000-0002-3984-6244 and Loo, Jonathan (2020) Network service  ...  Backward secrecy and forward secrecy of keys are possible, no entity or adversary is capable of computing keys in past session or predict feature keys.  ...  The use of federation relationships between domains should be used for seamless authentication and authorization to a variety of services. 5G should address security with unified multi-level security solutions  ... 
doi:10.1109/fmec49853.2020.9144706 dblp:conf/fmec/EdrisAL20a fatcat:f6pdtxwh6baelmmdktjaghikpe

A Modern View on Forward Security

Colin Boyd, Kai Gellert
2020 Computer journal  
Such a form of security is regarded as increasingly important in the modern world due to the existence of adversaries with mass storage capabilities and powerful infiltration abilities.  ...  We survey existing methods for achieving forward security for different cryptographic primitives and propose new definitions and terminology aimed at a unified treatment of the notion.  ...  Acknowledgments Research Council of Norway (248166 to C.B.); German Research Foundation (DFG) (JA 2445/2-1 to K.G.).  ... 
doi:10.1093/comjnl/bxaa104 fatcat:4rmqca3iabh2plsmjif7ai25je

On the Resilience of Key Agreement Protocols to Key Compromise Impersonation [chapter]

Maurizio Adriano Strangio
2006 Lecture Notes in Computer Science  
In particular, we consider a type of known key attack called key compromise impersonation that may occur once the adversary has obtained the private key of an honest party.  ...  This paper focuses on key agreement protocols in the asymmetric authentication model, wherein parties hold a public/private key pair.  ...  key exchange authenticated with signatures.  ... 
doi:10.1007/11774716_19 fatcat:z2lpqao2oze4ljt5qkpgppomyq

Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol [chapter]

Cas J. F. Cremers
2009 Lecture Notes in Computer Science  
In the paper "Stronger Security of Authenticated Key Exchange" [1, 2] , a new security model for authenticated key exchange protocols (eCK) is proposed.  ...  The model includes a new notion of an Ephemeral Key Reveal adversary query, which is claimed in e. g. [2] [3] [4] to be at least as strong as the Session-state Reveal query.  ...  In [1, 2] a security model is proposed which is said to be stronger than existing AKE (Authenticated Key Exchange) security models.  ... 
doi:10.1007/978-3-642-01957-9_2 fatcat:uy7uwdear5f6pkke2mezghqi5a
« Previous Showing results 1 — 15 out of 6,262 results