scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: An authenticated multiple-key agreement protocol uses a digital signature to sign the Diffie-Hellman public keys which can generate multiple session key in a single round of message exchange and achieve mutualauthentication.
Abstract: An authenticated multiple-key agreement protocol uses a digital signature to sign the Diffie-Hellmanpublic keys which can generate multiple session key in a single round of message exchange and achieve mutualauthentication. Recently, Hwang et al . proposed an authentication key exchange protocol which takes lesscomputation time than Harn and Lin’s protocol. However, this study, shows that Hwang et al .’s protocol sivulnerable to forgery attacks. An attacker can fool one communication part into believing the forged short-termpublic keys and share session keys with him. Key words: Authentication, cryptanalysis, key agreement, multiple-key INTRODUCTION In 1998, based on the MQV protocol, Harn and LinIn 1976, the key agreement protocol was introduced without using one-way functions. Summarily, Harn andby Diffie and Hellman [1]. The two parties were able o Lin’st protocol contain the authentication for the establish a secret session key over an insecure channel, Diffie-Hellman protocol. The two communication entitiessuch that the confidential information was transmitted can establish multiple session keys in one round f osecurely. However, the Diffie and Hellman protocol could interaction and use simple key computations.not provide authentication of the two parties. In other Unfortunately, Yen and Joye pointed out that Harnwords, the two parties could not authenticate each other. and Lin’s protocol had a security flaw; it suffered fromTo solve this problem, there are two ways to integrate forgery attacks. If a valid short-term public key pair s iauthentication into a key agreement protocol. One given, an attacker can forge a new short-term public keyapproach uses a pre-shared password

1 citations

Journal Article
TL;DR: The analysis shows that the protocol can achieve effective mutual authentication between reader and electronic tag, and it can effectively resist the denial of service attack, and compared with other protocols it reduces the amount of calculation of RFID system.
Abstract: Aiming at security and privacy protection problems faced in the existing RFID authentication protocol, this paper proposes a efficient RFID security authentication protocol based on Hash which can resist the denial of service attack.Using the comparison and recognition of random number on the reader, the protocol can resist the denial of service attacks. And two states of label identifier are stored in the database, in order to realize the electronic tag and the backend database data synchronization. Meanwhile, this paper theoretically analyzes the performance and security of the protocol,and the security of the protocol is formally proved by BAN logic. The analysis shows that the protocol can achieve effective mutual authentication between reader and electronic tag, and it can effectively resist the denial of service attack, and compared with other protocols it reduces the amount of calculation of RFID system. It is suitable for large-scale RFID system using electronic tags.

1 citations

Journal Article
TL;DR: This paper proposes security solution to protect MTP3 layer in SS7, using Key Exchange protocol and Authentication Header protocol, by which the security of SS7 network is enhanced.
Abstract: As the neural system of telecommunication network,the security problem of signaling system 7(SS7) becomes more serious.The main security threats of SS7 are listed in this paper,analyse the security flaw due to lack of authentication and how the attckers make use of the management messages of the MTP3 layer to attck the SS7 network,then propose security solution to protect MTP3 layer in SS7,using Key Exchange protocol and Authentication Header protocol,by which the security of SS7 network is enhanced.

1 citations

Journal ArticleDOI
TL;DR: The Xerox Network Systems architecture includes all of the security features found in today's most popular protocol suites and provides strong authentication at the beginning of each conversation.
Abstract: The Xerox Network Systems (XNS) architecture[1] includes all of the security features found in today's most popular protocol suites. In addition, XNS provides strong authentication at the beginning of each conversation. Authentication is the verification that both entities in a conversation are the ones claimed.[2] The Authentication Protocol[3] provides authentication in such a way that no passwords are ever transmitted on the network.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795