Home // AP2PS 2010, The Second International Conference on Advances in P2P Systems // View article


Fast and Automatic Verification of Authentication and Key Exchange Protocols

Authors:
Haruki Ota
Shinsaku Kiyomoto
Toshiaki Tanaka

Keywords: security verification method; authentication and key exchange protocols; verification points;

Abstract:
Security in a peer-to-peer (P2P) system is not considered, although it has many potential threats. In order to make the whole P2P system secure, various security functions require to be taken into consideration for these threats, respectively. We take up authentication and key exchange protocols as a target of the security functions in the P2P system. These protocols can bear one duty in order to realize the secure P2P system. It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet this requirement, we proposed the security verification method for the aforementioned protocols based on Bellare et al.'s model and showed the verification points of security properties to verify their security efficiently. However, there are three weaknesses in the aforementioned paper. In this paper, (1) we describe the relations of the six verification points, (2) explain how the proposed method verifies the aforementioned protocols by providing one example and (3) show the validity of the proposed method by verifying the security of 87 authentication and key exchange protocols that were generated automatically.

Pages: 7 to 13

Copyright: Copyright (c) IARIA, 2010

Publication date: October 25, 2010

Published in: conference

ISBN: 978-1-61208-102-1

Location: Florence, Italy

Dates: from October 25, 2010 to October 30, 2010