Requirements for security protocols

  • Authors:
  • Wuu Yang;Rong-Hong Jan

  • Affiliations:
  • Department of Computer Science, National Chiao-Tung University, Hsin-Chu, Taiwan, R.O.C.;Department of Computer Science, National Chiao-Tung University, Hsin-Chu, Taiwan, R.O.C.

  • Venue:
  • TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

A correct security protocol should satisfy four requirements: no-intrusion, authenticity, freshness, and secrecy. We divide the four requirements into two groups (one for no-intrusion, authenticity, and freshness and the other for secrecy). For the former we use the message-exchange forms and for the latter, we use the p-knows and n-knows information that is inferred from a latest topological orders of the trigger-graph. Based on these methods, flaws and weaknesses hidden in an imperfect security protocol could be uncovered.