In practice, users will rely on a wide variety of communication protocols to conduct their work over the Internet. This paper discusses the security ramifications of using multiple authentication protocols. We demonstrate multi-protocol attacks and how they can be realized to defeat otherwise secure authentication protocols. We highlight this discussion with examples of attacks on a proposed symmetric key-based authentication protocols. We present a model of communication that reflects the existence of this type of attack, and demonstrate that a class of authentication protocols can never be secure in the presence of this type of attack. Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Abstract In...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
[[abstract]]The security of a two-party authentication protocol relies on the stored secrets of each...
. There are many cases in the literature in which reuse of the same key material for different funct...
The public-key infrastructure will be utilized to store and disseminate certified copies of user’s p...
Formal modeling and verification of security protocols typically assumes that a protocol is executed...
Recently, Tsai and Hsiang et al. each proposed a multi-server authentication protocol. They claimed ...
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing ...
We introduce a family of multi-party authentication protocols and discuss six novel protocols, which...
Formal modeling and verification of security protocols typically assumes that a protocol is executed...
A password-authenticated key exchange scheme allows two entities, who only share a memorable passwor...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Key agreement protocols are a fundamental building block for ensuring authenticated and private com...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
Typical protocols for password-based authentication assumes a single server which stores all the pas...
Protocols for authentication and key establishment are the foundation for security of communications...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
[[abstract]]The security of a two-party authentication protocol relies on the stored secrets of each...
. There are many cases in the literature in which reuse of the same key material for different funct...
The public-key infrastructure will be utilized to store and disseminate certified copies of user’s p...
Formal modeling and verification of security protocols typically assumes that a protocol is executed...
Recently, Tsai and Hsiang et al. each proposed a multi-server authentication protocol. They claimed ...
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing ...
We introduce a family of multi-party authentication protocols and discuss six novel protocols, which...
Formal modeling and verification of security protocols typically assumes that a protocol is executed...
A password-authenticated key exchange scheme allows two entities, who only share a memorable passwor...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
Key agreement protocols are a fundamental building block for ensuring authenticated and private com...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
Typical protocols for password-based authentication assumes a single server which stores all the pas...
Protocols for authentication and key establishment are the foundation for security of communications...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
[[abstract]]The security of a two-party authentication protocol relies on the stored secrets of each...
. There are many cases in the literature in which reuse of the same key material for different funct...