A Directed Graph-Based Authentication Protocol Model and Its Security Analysis

The formal description of authentication protocol and its security analysis is one of the important issues in the protocol analysis. In order to solve the problem in the formal description of cryptographic protocol, a method based on directed graph is presented to formally depict the authentication protocol specification. Meanwhile, a converse-searching algorithm based on directed graph is also presented to construct the protocol messages. When this method is used to analyze WOO-LAM authentication, a new flow and its attacking trace have been founded

[1]  Joshua D. Guttman,et al.  Strand Spaces: Proving Security Protocols Correct , 1999, J. Comput. Secur..

[2]  Wenbo Mao,et al.  An augmentation of BAN-like logics , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.

[3]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[4]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[5]  Catherine A. Meadows,et al.  Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..