Affiliation:
1. Jingdezhen Ceramic Institute
Abstract
This paper researched on Needham-Schroeder symmetric key authentication protocol based on BAN logic. It pointed out the flaw of the protocol which can be used by replay attack and improved the protocol by adding nonce in the transferred message. Then it listed the improved NS authentication protocol. Finally, this paper proved the improved protocol successful and available with BAN logic.
Publisher
Trans Tech Publications, Ltd.
Reference10 articles.
1. Sihan Qing. Progress in security protocols for 20 years. Journal of software, 2003, 14(10): 1740-1752.
2. Michael Burrows and Martin Abadi and Roger Needham. Ban concrete Andrew Secure RPC. Last modified November 14, (2002).
3. Emina Torlak, Marten van Dijk, Blaise Gassend, etc. Knowledge Flow Analysis for Security Protocols. Computer Science and Artificial Intelligence Laboratory, August 8, (2005).
4. Scott D. Stoller and Fred B. Schneider. Automated Analysis of Fault-Tolerance in Distribute Systems. Formal Methods in System Design, 2005, 26(2): 183-196.
5. Seamons K, Winslett M, Yu T. Requirements for Policy Language for Trust Negotiation[A]. In: Proeeedings of the Third IEEE International Workshop on Policies for Distributed Systems and Networks, 2002: 68-79.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献