A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model (Englisch)

in Computer Journal, London ; 50 , 5 ; 591-601
Computer Journal, London
; 2007
  • Neue Suche nach:

Although the yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analysed by researchers from the computer security community (using automated proof tools), a simplified version of the protocol is only recently proven secure by Backes and Pfitzmann ((2006) On the cryptographic key secrecy of the strengthened yahalom protocol. Proc. IFIP SEC 2006) in their cryptographic library framework. We present a protocol for key establishment that is closely based on the yahalom protocol. We then present a security proof in the Bellare, M. and Rogaway, P. ((1993a). Entity authentication and key distribution. Proc. of CRYPTO 1993, Santa Barbara, CA, August 22-26, LNCS, Vol. 773, pp. 110-125. Springer-Verlag, Berlin) model and the random oracle model. We also observe that no partnering mechanism is specified within the yahalom protocol. We then present a brief discussion on the role and the possible construct of session identifiers (SIDs) as a form of partnering mechanism, which allows the right session key to be identified in concurrent protocol executions. We then recommend that SIDs should be included within protocol specification rather than consider SIDs as artefacts in protocol proof.

Wie erhalte ich diesen Titel?

Dokumentinformationen


Inhaltsverzeichnis – Band 50, Ausgabe 5

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Nachweisen der enthaltenen Aufsätze. Die Anzeige der Jahrgänge kann aufgrund fehlender Aufsatznachweise unvollständig oder lückenhaft sein, obwohl die Zeitschrift komplett in der TIB verfügbar ist.

501
Capsule Reviews
Kamareddine, Fairouz | 2007
505
The Boole Lecture Quantum Information: A Glimpse at the Strange and Intriguing Future of Information
Marinescu, Dan C. / Marinescu, Gabriela M. | 2007
522
Service Availability in Concurrent Systems Part I: A Theory of Hierarchical Services of Interacting Processes
Fallah, Mehran S. / Sharafat, Ahmad R. | 2007
535
Service Availability in Concurrent Systems Part II: Analysis and Case Studies Using HSIP
Fallah, Mehran S. / Sharafat, Ahmad R. | 2007
555
An In Out Combined Dynamic Weighted Round-Robin Method for Network Load Balancing
Li, Der-Chiang / Chang, Fengming M. | 2007
567
Comparing Typical Opening Move Choices Made by Humans and Chess Engines
Levene, Mark / Bar-Ilan, Judit | 2007
574
Some Generalizations of a Simion Schmidt Bijection
Juarna, Asep / Vajnovszki, Vincent | 2007
581
Parallel Generation of t-Ary Trees in A-order
Ahrabian, H. / Nowzari-Dalini, A. | 2007
589
On The Security of a Group Key Agreement Protocol
Tang, Qiang | 2007
591
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Choo, Kim-Kwang Raymond | 2007
591
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model1
Choo, K. K. | 2007
602
Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers
Hwang, Ren-Junn / Shiau, Sheng-Hua | 2007
616
A High-Speed Link Layer Architecture for Low Latency and Memory Cost Reduction
Lee, Jaesung / Lee, Hyuk-Jae / Lee, Chanho | 2007

Ähnliche Titel