Abstract
A correct security protocol should satisfy four requirements: no-intrusion, authenticity, freshness, and secrecy. We divide the four requirements into two groups (one for no-intrusion, authenticity, and freshness and the other for secrecy). For the former we use the message-exchange forms and for the latter, we use the p-knows and n-knows information that is inferred from a latest topological orders of the trigger-graph. Based on these methods, flaws and weaknesses hidden in an imperfect security protocol could be uncovered.
Original language | English |
---|---|
Pages (from-to) | 1576-1581 |
Number of pages | 6 |
Journal | WSEAS Transactions on Computers |
Volume | 5 |
Issue number | 7 |
State | Published - 1 Jul 2006 |
Keywords
- Authentication
- Authentication protocol
- Computer communication
- Computer security
- Security protocol
- Verification