Requirements for security protocols

Wuu Yang*, Rong Hong Jan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

A correct security protocol should satisfy four requirements: no-intrusion, authenticity, freshness, and secrecy. We divide the four requirements into two groups (one for no-intrusion, authenticity, and freshness and the other for secrecy). For the former we use the message-exchange forms and for the latter, we use the p-knows and n-knows information that is inferred from a latest topological orders of the trigger-graph. Based on these methods, flaws and weaknesses hidden in an imperfect security protocol could be uncovered.

Original languageEnglish
Pages (from-to)1576-1581
Number of pages6
JournalWSEAS Transactions on Computers
Volume5
Issue number7
StatePublished - 1 Jul 2006

Keywords

  • Authentication
  • Authentication protocol
  • Computer communication
  • Computer security
  • Security protocol
  • Verification

Fingerprint

Dive into the research topics of 'Requirements for security protocols'. Together they form a unique fingerprint.

Cite this