scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
17 Aug 2012
TL;DR: It is verified that the BAN logic can be used formally and prove the correctness and security of the protocols, which indicates that BAN Logic is an important tool for analyzing cryptographic protocols.
Abstract: This paper analyzes the Otway-Rees protocol based on BAN logic after has introducing the BAN logic. It has verified that the BAN logic can be used formally and prove the correctness and security of the protocols, which indicates that BAN logic is an important tool for analyzing cryptographic protocols. The paper has established the ideal protocol model to Otway-Rees protocol based on the BAN logic, which uses the initial assumption of the protocol and the publicly known assumption of the BAN logic to analyze the security of Otway-Rees protocol.

10 citations

Journal ArticleDOI
TL;DR: This work proposes a secure scheme countering the identified flaws of Zhang et al. and other contemporary schemes and demonstrates the security strength of proposed scheme by employing the formal security analysis under BAN logic.
Abstract: The Session Initiation Protocol (SIP) provides a way to control the wired and wireless Voice over Internet Protocol-based communication over an insecure channel. The SIP protocol is not secure due to relying on an intrinsically open text-based communication, which further stresses the strengthening of SIP authentication protocols. Many solutions have been put forward in the last few years to design the secure and efficient SIP authentication protocols for multimedia. Recently, Zhang et al. proposed a SIP authentication protocol with an enhanced feature that enables the server authenticate the users on the basis of biometric verification. However, after a careful observation, one can witness few limitations regarding privileged insider attack, session specific temporary attack, De-synchronization attack; denial-of-service attack, inefficient password modification and lack forward secrecy compromise. We have proposed a secure scheme countering the identified flaws of Zhang et al. and other contemporary schemes. We also demonstrate the security strength of proposed scheme by employing the formal security analysis under BAN logic.

10 citations

Journal ArticleDOI
TL;DR: A new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certificate are described and it is shown that the authentication protocol is secure against malicious adversaries.
Abstract: We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certificate. The certificate binds the identity of a wireless smart device to the anchor element of its key chain; keys from the chain are used for computing message authentication codes (MACs) onmessages sourced by the device. The authentication protocol requires a centralized infrastructure in the network: we describe the protocol in a hybrid wireless network with a satellite overlay interconnecting the wireless devices. The satellite is used as the Certificate Authority (CA) and also acts as the proxy for the senders in disclosing the MAC keys to the receivers. We also design a probabilistic nonrepudiation mechanism that utilizes the satellite's role as the CA and sender proxy. Through analysis, we show that the authentication protocol is secure against malicious adversaries. We also present detailed simulation results that demonstrate that the proposed protocol is much cheaper than traditional public key-based authentication technologies for metrics like processing delay, storage requirements, and energy consumption of the smart devices.

10 citations

Proceedings ArticleDOI
01 May 1999
TL;DR: The sketch of a Language for Authentication Protocols (LAP) is sketched, an exponential lower bound on the worst-case number of concurrent runs needed in a successful attack on a LAP protocol is established, and an exponential upper bound is established.
Abstract: Many authentication protocols are intended to work correctly in the presence of an adversary that can intercept messages, perform an unbounded number of encryptions and other operations while fabricating messages, and prompt honest principals to engage in an unbounded number of concurrent (i.e., interleaved) runs of the protocol. The amount of local state maintained by a single run of an authentication protocol is bounded. This suggests the existence of upper bounds on the resources needed to attack a protocol. Such bounds provide a rigorous basis for automated verification. We sketch a Language for Authentication Protocols (LAP), based on [WL93], and establish an exponential lower bound on the worst-case number of concurrent runs needed in a successful attack on a LAP protocol. Details appear in [Sto98a]. An exponential upper bound would be too large to enable automated verification. This shows the need to impose additional restrictions on the class of protocols, as done in [Sto98b], which gives a polynomial upper bound. The relevant kinds of statements (slightly simplified) in LAP are: NewValue(v), which generates a unique value (e.g., a nonce or session key) and binds variable v to it; Send(x, t), which sends a message t to x; and Receive(pat), which receives a message m and binds the unbound variables in pattern pat to the corresponding subterms of m. The Receive statement attempts pattern-matching between a candidate message m and the pattern. A pattern can express that the message should be a ciphertext produced with a given key. If m is encrypted with the given key (if any) and there exist bindings for the unbound variables of pat such that pat with those bindings equals m, then the Receive statement executes and establishes those bindings. The Receive statement blocks until this condition is satisfied. A local protocol is a finite sequence of statements satisfying some well-formedness requirements. A protocol is, roughly, a set of local protocols, one for each role (or participant) in the protocol. A secrecy requirement asserts that certain values are not revealed to the adversary.

10 citations

Journal ArticleDOI
TL;DR: The proposed 2PAKE protocol has a great contribution to the area of mobile environment and meets the needs of two-party authentication key exchange.
Abstract: Mobile environment has been used in large area range of network. In order to secure communication, a number of schemes have been proposed. The typical schemes are two-party authentication key exchange (2PAKE) protocols. It is based on elliptic curve cryptosystem. The main weakness of the protocol is that attackers have the ability to impersonate a legal user at any time. In addition, it is vulnerable to the public key problem and unknown key share attack. In this paper, we propose a 2PAKE protocol. Our protocol is indeed safer and meets the needs. Hence, the proposed protocol has a great contribution to the area of mobile environment.

10 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795