Authentication Protocol Security Assessment Framework Based on Attack Classification

Article Preview

Abstract:

Security of authentication protocol is an important factor to network security. To ensure protocol security, attacks on authentication protocol were classified from the aspect of security theory and implement. On this basis, an authentication protocol security assessment was discussed. The framework determines security risk of authentication from security of password system, vulnerability of protocol itself and environment threat possibility. It can be used to assess security and capability to resist risks objectively

You might also be interested in these eBooks

Info:

Periodical:

Pages:

859-863

Citation:

Online since:

December 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Carlsen U.: Cryptographic protocol flaws know your enemy, Proceedings of the 7th IEEE Computer Security Foundations Workshop. Franconia, NH: IEEE Computer Society Press, 1994, pp.192-200.

DOI: 10.1109/csfw.1994.315934

Google Scholar

[2] Gritzalis S. and Spinellis D.: Cryptographic protocols over open distributed systems: a taxonomy of flaws and related protocol analysis tools, Proceedings of the 16th International Conference on computer Safety, Reliability and Security, Ney York, UK, 1997, pp.123-137.

DOI: 10.1007/978-1-4471-0997-6_10

Google Scholar

[3] G. L. Wang and S. H. Qing: A new cryptographic protocol attack classification method, Proceedings of 1st Information and Communication Security conference, Beijing, 2000, pp.136-141.

Google Scholar

[4] Syverson P.: A taxonomy of replay attacks, Proceedings of the 7th IEEE Computer Security Foundations Workshop. Franconia, NH: IEEE Computer Society Press, 1994, pp.131-136.

DOI: 10.1109/csfw.1994.315935

Google Scholar

[5] J. F. Liu and M. T. Zhou: Research and Taxonomy of Replay Attacks on Security Protocol, Application Researches of Computers, vol. 24, 2007, pp.135-139.

Google Scholar

[6] J. L. Zhuo, X. X. Li and J. X. Li: A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation, Journal of Computer Research and Development, vol. 42, 2005, pp.1100-1107.

DOI: 10.1360/crad20050702

Google Scholar

[7] Dolev D., Yao A. C. On the security of public key protocols, IEEE Transaction on Information Theory, vol. 29, 1983, pp.198-208.

DOI: 10.1109/tit.1983.1056650

Google Scholar

[8] D. Huang, W. D. Hu and K. F. Chen: Classification of Network Attack and Anti-attack, Computer Engineering, vol. 27, 2001, pp.132-133.

Google Scholar

[9] Lomas M., Gong Li and Saltzer J. H.: Reducing risks from poorly chosen keys, ACM SIGOPS Operating Systems Review, vol. 23, 1989 , pp.14-18.

DOI: 10.1145/74851.74853

Google Scholar

[10] Gong Li: A security risk of depending on synchronized clocks, ACM SIGOPS Operating Systems Review, vol. 26, 1992, pp.49-53.

DOI: 10.1145/130704.130709

Google Scholar

[11] Guttman J. D., Fabrega J. T.: Protocol independence through disjoint encryption, Proceedings of the 13th IEEE Computer Security Foundations Workshop. Washington DC: IEEE Computer Society, 2000, pp.24-34.

DOI: 10.1109/csfw.2000.856923

Google Scholar