scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Proceedings ArticleDOI
10 Mar 2006
TL;DR: The purpose is to emphasize the design criteria of an authentication protocol through the use of some nice and subtle attacks that existed in the literature in the field of the design of security protocols.
Abstract: The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable methods in the design of secure systems. Security protocols are one of the most important design parameters. History has proven security protocols to be vulnerable even after they enjoyed circumspect design and meticulous review by experts. We posit that understanding the subtle issues in security protocols is important when designing a protocol. In particular, understanding a penetrator and the knowledge of different attack strategies that a penetrator can apply are among the most important issues that affect the design of security protocols. We describe the notion of a penetrator and specify his characteristics. Our purpose is to emphasize the design criteria of an authentication protocol through the use of some nice and subtle attacks that existed in the literature in the field of the design of security protocols.

27 citations

Proceedings ArticleDOI
11 Dec 2010
TL;DR: A rigorous security analysis of the privacy-CA solution protocol and proposes a strengthened protocol that meets a stronger notion of security where the adversary is allowed to adaptively corrupt TPMs.
Abstract: The privacy-CA solution (PCAS) is a protocol designed by the Trusted Computing Group (TCG) as an alternative to the Direct Anonymous Attestation scheme for anonymous authentication of Trusted Platform Module (TPM). The protocol has been specified in TPM Specification Version 1.2. In this paper we offer a rigorous security analysis of the protocol. We first design an appropriate security model that captures the level of security offered by PCAS. The model is justified via the expected uses of the protocol in real applications. We then prove, assuming standard security notions for the underlying primitives that the protocol indeed meets the security notion we design. Our analysis sheds some light on the design of the protocol. Finally, we propose a strengthened protocol that meets a stronger notion of security where the adversary is allowed to adaptively corrupt TPMs.

26 citations

Book ChapterDOI
29 Mar 2004
TL;DR: If all the protocol participants are successfully validated, then the protocol as a whole guarantees entity authentication in the presence of Dolev-Yao intruders.
Abstract: We propose a new method for the static analysis of entity authentication protocols. We develop our approach based on a dialect of the spi-calculus as the underlying formalism for expressing protocol narrations. Our analysis validates the honest protocol participants against static (hence decidable) conditions that provide formal guarantees of entity authentication. The main result is that the validation of each component is provably sound and fully compositional: if all the protocol participants are successfully validated, then the protocol as a whole guarantees entity authentication in the presence of Dolev-Yao intruders.

26 citations

Book ChapterDOI
01 Jun 2011
TL;DR: It is shown that the proposed protocol does not have cited security features properly, and the whole security of the protocol is broken, and Yeh et al.'s Protocol does not assure the untraceabilitiy and backwarduntraceabilitative attributes.
Abstract: Yeh et al. have recently proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard. They claim their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we show that the proposed protocol does not have cited security features properly. A powerful and practical attack is presented on this protocol whereby the whole security of the protocol is broken. Furthermore, Yeh et al.'s protocol does not assure the untraceabilitiy and backwarduntraceabilitiy attributes. We also will propose our revision to safeguard the Yeh et al.'s protocol against cited attacks.

26 citations

Journal ArticleDOI
TL;DR: This study presented an efficient design of identity‐based handover authentication protocol for wireless mobile networks under the prime‐order elliptic curve cryptosystem and is examined to be more efficient from the size of the security parameter and computation costs than the previous protocols.
Abstract: This study presented an efficient design of identity-based handover authentication protocol for wireless mobile networks under the prime-order elliptic curve cryptosystem. The present work does not include the time-consuming and expensive bilinear pairing and map-to-point hash functions. The proposed protocol is analyzed in the random oracle model and also demonstrated to have other security properties, including protection against replay attack and denial-of-service attack, user anonymity and unlinkability, subscription validation, conditional privacy preservation, and mutual authentication. Our handover authentication protocol is examined to be more efficient from the size of the security parameter and computation costs than the previous protocols. Copyright © 2014 John Wiley & Sons, Ltd.

26 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795