Affiliation:
1. EAS Group, ENSEM, Hassan II University, Casablanca, Morocco
2. LSFM Group, Laval University, Quebec, QC, Canada
Abstract
Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.
Subject
Computer Networks and Communications,Information Systems
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Two-Way Handshake User Authentication Scheme for e-Banking System;Intelligent Computing and Communication;2020
2. Authentication by Witness Functions;2016 IEEE Trustcom/BigDataSE/ISPA;2016-08
3. The Theory of Witness-Functions;Recent Advances in Systems Safety and Security;2016
4. Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions;2015 IEEE International Conference on Systems, Man, and Cybernetics;2015-10