scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Book ChapterDOI
01 Dec 2010
TL;DR: A three-phase probabilistic approach to recover the secret keys of the UCS-RFID protocol with a probability that increases by accessing more protocol runs, and shows that tracing a tag using this protocol is also possible even with less runs of the protocol.
Abstract: Recently, Alomair et al. proposed the first UnConditionally Secure mutual authentication protocol for low-cost RFID systems(UCSRFID). The security of the UCS-RFID relies on five dynamic secret keys which are updated at every protocol run using a fresh random number (nonce) secretly transmitted from a reader to tags. Our results show that, at the highest security level of the protocol (security parameter= 256), inferring a nonce is feasible with the probability of 0.99 by eavesdropping(observing) about 90 runs of the protocol. Finding a nonce enables a passive attacker to recover all five secret keys of the protocol. To do so, we propose a three-phase probabilistic approach in this paper. Our attack recovers the secret keys with a probability that increases by accessing more protocol runs. We also show that tracing a tag using this protocol is also possible even with less runs of the protocol.
Journal ArticleDOI
Shu Liu1, Rui Jiang1
TL;DR: It is shown that the protocol is vulnerable to the wormhole attack since it does not consider the verification of the neighbor nodes within its radio range and an improved version is proposed which can keep the frame of the SecDEACH protocol and overcome the security shortages.
Abstract: In this paper, we analyze a secure and dynamic clustering protocol SecDEACH. Through analysis, we show that the protocol is vulnerable to the wormhole attack since it does not consider the verification of the neighbor nodes within its radio range. We give a wormhole attack to the protocol and propose an improved version which can keep the frame of the SecDEACH protocol and overcome the security shortages. Finally, we make an analysis of the improved protocol and conclude the paper.
Liu Song, Guo Nai-fu, Xie Fan, Zhang Li, Li Miao 
01 Jan 2014
TL;DR: The constructed new PAKE protocol with mutual authentication is proved to be UC secure and simple structure, and the security of protocol is realized when running in parallel in any multi-party environment.
Abstract: )To solve the problem that mutual authentication is lacked in many existing Password-authenticated Key Exchange(PAKE) protocol, this paper proposes an Universally Composable(UC) secure Mutual Password-authenticated Key Exchange(MPAKE) protocol. An ideal function of PAKE protocol with mutual authentication is defined, the mutual authentication between entities is described explicitly in the defined function, and a new protocol which achieves the ideal function is constructed based on the Joint state UC(JUC) model. So the shared parameters can be used to facilitate the protocol between entities. The new protocol can realize mutual authentication based on password and a session key can also be negotiated. The emulator and its operations are constructed, and its indistinguishability is analyzed. Thus the constructed new PAKE protocol with mutual authentication is proved to be UC secure and simple structure, and the security of protocol is realized when running in parallel in any multi-party environment.
Dissertation
01 Jan 2012
TL;DR: This thesis summarizes an existing protocol, that is chosen to call the Token Key Agreement protocol, and goes on to introduce two new protocols, which are chosen to name the Symmetrickey agreement protocol and the AsymmetricKey Agreement protocol.
Abstract: This thesis summarizes an existing protocol, that we have chosen to call the Token Key Agreement protocol. It then goes on to introduce two new protocols we have chosen to name the Symmetric Key Agreement protocol and the Asymmetric Key Agreement protocol. We are working within the UC framework, and as such introduce ideal functionalities and protocol descriptions for the protocols. For the first protocol we also introduce a simulated adversary. Further, the paper includes an overview of the security offered by the three protocols.
Book ChapterDOI
30 Jan 2002
TL;DR: This work demonstrates that the Shieh-Yang-Sun ID-based authentication and key distribution protocol is vulnerable to the replay attack and the unknown key share attack and describes an improved protocol that has better resistance ability to these attacks.
Abstract: It has been pointed out that the Shieh-Yang-Sun ID-based authentication and key distribution protocol is vulnerable to the replay attack and the unknown key share attack We further demonstrate that the protocol is vulnerable to the forgery attack, too In addition, we describe an improved protocol that has better resistance ability to these attacks

Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795