Title
Designing Authentication Protocols: Trends And Issues
Abstract
The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable methods in the design of secure systems. Security protocols are one of the most important design parameters. History has proven security protocols to be vulnerable even after they enjoyed circumspect design and meticulous review by experts. Plethora of formal systems exist in order to verify a security protocol. We posit that understanding the subtle issues in security protocols is important when designing a formal framework. In particular, we discuss authentication protocols. We mention their characteristics and point out important design features that a security protocol designer should focus in the design process. We also describe the notion of a penetrator and specify his characteristics. Our purpose is to emphasize the design criteria of an authentication protocol, clarify some subtleties, and give suggestions and pointers that may become helpful in the field of design and verification of cryptographic protocols. © 2006 IEEE.
Publication Date
1-1-2006
Publication Title
Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies,ICN/ICONS/MCL'06
Volume
2006
Number of Pages
76-
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1109/ICNICONSMCL.2006.76
Copyright Status
Unknown
Socpus ID
33750948842 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/33750948842
STARS Citation
Muhammad, Shahabuddin; Furqan, Zeeshan; and Guha, Ratan K., "Designing Authentication Protocols: Trends And Issues" (2006). Scopus Export 2000s. 9133.
https://stars.library.ucf.edu/scopus2000/9133