Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol

  • Authors:
  • Guoqiang Li;Mizuhito Ogawa

  • Affiliations:
  • NCES, Graduate School of Information Science, Nagoya University,;Japan Advanced Institute of Science and Technology,

  • Venue:
  • ATVA '08 Proceedings of the 6th International Symposium on Automated Technology for Verification and Analysis
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus on the concepts of corresponding assertion and key distribution. This paper proposes an on-the-fly model checkingmethod based on the pushdown system to verify the authentication of recursive protocols with an unbounded number of principals. By experiments of the Maude implementation, we find the recursive authentication protocol, which was verified in the sense of (weak) key distribution, has a flaw in the sense of correspondence assertion.