scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
24 Mar 2015
TL;DR: This paper presents a cryptographic calculation of the shared secret key enabling mutual authentication and confidentiality services over public, insecure networks and simulation result reveals that the protocol is practical and provably-secure.
Abstract: Data exchange over public network requires for the most part an important security mechanism enabling to both sender and receiver the property that they can mutual authenticate using different identification parameters playing the vital role of secret shared key computation. Based on the decisional Diffie-Hellman assumptions, this paper presents a cryptographic calculation of the shared secret key enabling mutual authentication and confidentiality services over public, insecure networks. This protocol is efficient than "classical" Diffe-Hellman key exchange which provides no authentication at all and suffer from man-in-the-middle attack. To attain this, we first model the scheme with mathematical concept for exponential calculation using entity parameters and finally we simulate the work by Scyther tool to verify the provability of the sameness 'shared secret value. With the standards cryptographic assumptions, the simulation result reveals that the protocol is practical and provably-secure. Thus, the proposed cryptographic protocol is awfully, straightforward, valuable, and resilient to know attacks.
01 Jan 2012
TL;DR: An enhanced protocol to eliminate undetectable online password guessing attack proposed by Yoon and Yoo is presented and it is proposed which could achieve better performance by requiring only four message transmission round and the performance is analyzed on a set of experiments.
Abstract: It is easy to choose and memorize simple and meaningful vocabulary as secret passwords, but it is very hard to meet the requirement of security and efficiency. Hence chang and chang proposed a novel three party encrypted key exchange protocol without using the server’s public keys. The key exchange protocol has achieved great attention due to its simplicity and efficiency. It was claimed that the protocol was practically secure and efficient. On the other hand, the protocol resists all types of password guessing attacks, because the password is of low entropy. It was then Yoon and Yoo who demonstrated the vulnerability of chang and chang’s protocol regarding undetectable on line password guessing attacks. This paper presents an enhanced protocol to eliminate undetectable online password guessing attack proposed by Yoon and Yoo.it also proposed an enhanced protocol which could achieve better performance by requiring only four message transmission round and the performance is analyzed on a set of experiments.
Journal ArticleDOI
TL;DR: This work presents a logic program based approach for automating proofs of invariant that appears effective for invariants that are required for several standardized, widely deployed protocols.
Proceedings ArticleDOI
25 Sep 2005
TL;DR: This paper makes a brief analysis of the proposed Wulf et al. protocol, by which an entity can authenticate in a distributed system environment without using any shared secret, and shows how it can be broken.
Abstract: Authentication protocols have applications in many fields. The security of authentication protocols is commonly based on cryptographic primitives. Constructing secure authentication protocols is not an easy challenge and there are a large number of authentication protocols that prove to be insecure. Wulf et al. have proposed a protocol by which an entity can authenticate in a distributed system environment without using any shared secret. This paper makes a brief analysis of the proposed protocol and shows how it can be broken. The protocol will be broken by using multiplicative inverses of the integers from Z/sub n/, where n is a prime number.

Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795