A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Formalizing and Verifying Generations of AKA Protocols
2019
Mobile networks are connecting the world. More and more mobile network subscribers rely on a secure connection for their communication. The Authentication and Key Agreement (AKA) protocol variants used in mobile networks are crucial to ensure integrity and confidentiality of communication. In this thesis, we analyze different AKA protocol variants currently deployed by leveraging formal models and the Tamarin security protocol verification tool. Specifically, we first formally model individual
doi:10.3929/ethz-b-000372339
fatcat:7qghp5bmerh63brqbuse2ufeb4