Computer Science ›› 2015, Vol. 42 ›› Issue (1): 149-154.doi: 10.11896/j.issn.1002-137X.2015.01.035

Previous Articles     Next Articles

One Strong Authentication Test Suitable for Analysis of Nested Encryption Protocols

SONG Wei-tao and HU Bin   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Authentication test is a new type of analysis method of security protocols,which is proposed based on strand space model.It attracts a majority of scholars’ attention because of its simple and practical,but it doesn’t suitable for the analysis of nested encryption protocols.This greatly restricts the application of the method.Meanwhile,the existing improvement schemes are difficult to break through the limitation thoroughly on account of strand space’s poor ability of reflecting the internal relations of terms.By introducing the definitions of equivalence class,class elements,security encryption item,and security encryption package,etc.,this paper improved the strand space’s ability of depicting the internal relations of terms.Then it put forward a general authentication test scheme which can be applied to anylize the nested encryption scenarios of authentication test element in the protocols.Furthermore,we verified the correctness and effectiveness of the new method from two aspects:formal proof and instance analysis.

Key words: Security protocol,Formal analysis method,Strand space,Authentication test

[1] Fabrega F J T,Herzog J C,Guttman J D.Strand space:Why is a security protocol correct[C]∥IEEE Computer Society Press Proc.of the IEEE Symp.on Research in Security and Privacy.Oakland,1998:160-171
[2] Meadows C.Open issues in formal methods for cryptographic protocol analysis[C]∥Proceedings,IEEE DARPA Information Survivability Conference and Exposition.2000,1:237-250
[3] Guttman J D,Thayer F J.Authentication tests[C]∥Procee-dings,2000 IEEE Symposium on Security and Privacy.IEEE Computer Society Press,May 2000:96-109
[4] Guttman J D.Security protocol design via authentication tests[C]∥Proceedings Computer Security Foundations Workshop,2002.15th IEEE.IEEE,2002:92-103
[5] Wang Q,Zhi F H,Ao J H.Design and Security Analysis of Mobile Identity Authentication Protocol[J].Advanced Materials Research,2012,403:2645-2649
[6] Chen N,Jiang R.Security Analysis and Improvement of UserAuthentication Framework for Cloud Computing[J].Journal of Networks,2014,9(1):198-203
[7] Perrig A,Song D.Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement[C]∥Proc.of the 13th Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,2000:64-76
[8] Li Y J,Pang J.Generalized unsolicited tests for authenticationprotocol analysis[C]∥IEEE Computer Society Press Proc.of the 7th Int’l Conf.on Parallel and Distributed Computing,Applications and Technologies.2006:509-514
[9] Liu J F,Zhou M T.Research and improvement on authentication test’s limitation[J].High Technology Letters,2008,4(3):266-270
[10] 刘家芬,周明天.突破认证测试方法的局限性[J].软件学报,2009,0(10):2799-2809
[11] Zhang G,Rong M,Fang Y.One extension of authentication test based on strand space model[C]∥Proc.of the 5th International Conference on Wireless Communications,Networking and Mobile Computing.IEEE Press,2009:4506-4509
[12] Zhou Q,Wu X.Extensions to Authentication Test and Its Application[J].Journal of Zhengzhou University (Engineering Science),2010,3:014
[13] Wang Q,Zhi F H,Ao J H.Design and Security Analysis of Mobile Identity Authentication Protocol[J].Advanced Materials Research,2012,403:2645-2649
[14] Muhammad S.Applying authentication tests to discover Man-In-The-Middle attack in security protocols[C]∥Eighth International Conference on Digital Information Management (ICDIM),2013.IEEE,2013:35-40
[15] 余磊,魏仕民.协议主体密钥在测试组件构造上的性质分析[J].计算机工程与应用,2013,49(6):114-117
[16] Khot R A,Srinathan K, Kumaraguru P.A novel Jigsaw based authentication scheme using tagging[C]∥Proc.of the 2011 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.2011:2605-2614

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!