Title

Designing Authentication Protocols: Trends And Issues

Abstract

The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable methods in the design of secure systems. Security protocols are one of the most important design parameters. History has proven security protocols to be vulnerable even after they enjoyed circumspect design and meticulous review by experts. Plethora of formal systems exist in order to verify a security protocol. We posit that understanding the subtle issues in security protocols is important when designing a formal framework. In particular, we discuss authentication protocols. We mention their characteristics and point out important design features that a security protocol designer should focus in the design process. We also describe the notion of a penetrator and specify his characteristics. Our purpose is to emphasize the design criteria of an authentication protocol, clarify some subtleties, and give suggestions and pointers that may become helpful in the field of design and verification of cryptographic protocols. © 2006 IEEE.

Publication Date

1-1-2006

Publication Title

Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies,ICN/ICONS/MCL'06

Volume

2006

Number of Pages

76-

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

DOI Link

https://doi.org/10.1109/ICNICONSMCL.2006.76

Socpus ID

33750948842 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/33750948842

This document is currently not available here.

Share

COinS