The Provably Secure Formal Methods for Authentication and Key Agreement Protocols

Author(s):  
Jianfeng Ma ◽  
Xinghua Li

In the design and analysis of authentication and key agreement protocols, provably secure formal methods play a very important role, among which the Canetti-Krawczyk (CK) model and universal composable (UC) security model are very popular at present. This chapter focuses on these two models and consists mainly of three parts: (1) an introduction to CK model and UC models; (2) A study of these two models, which includes an analysis of CK model and an extension of UC security model. The analysis of CK model presents its security analysis, advantages, and disadvantages, and a bridge between this formal method and the informal method (heuristic method) is established; an extension of UC security model gives a universally composable anonymous hash certification model. (3) The applications of these two models. With these two models, the four-way handshake protocols in 802.11i and Chinese wireless LAN (WLAN) security standard WLAN authentication and privacy infrastructure (WAPI) are analyzed.

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Amir Masoud Rahmani ◽  
Mokhtar Mohammadi ◽  
Shima Rashidi ◽  
Jan Lansky ◽  
Stanislava Mildeova ◽  
...  

2016 ◽  
Vol 9 (18) ◽  
pp. 5412-5431 ◽  
Author(s):  
Sravani Challa ◽  
Ashok Kumar Das ◽  
Saru Kumari ◽  
Vanga Odelu ◽  
Fan Wu ◽  
...  

2015 ◽  
Vol 82 (1-2) ◽  
pp. 29-38 ◽  
Author(s):  
Tian-Fu Lee ◽  
Ching-Ying Lin ◽  
Chun-Li Lin ◽  
Tzonelih Hwang

2018 ◽  
Vol 14 (1) ◽  
pp. 155014771875479 ◽  
Author(s):  
Min Wei ◽  
Shuaidong Zhang ◽  
Ping Wang ◽  
Keecheon Kim

As an industrial communication data interaction specification, OPC Unified Architecture effectively solves the industrial Internet of Things system integration problem. This article designs an authentication and key agreement scheme based on implicit certificate using the security model provided by OPC Unified Architecture. It establishes the secure channel and provides a guarantee for secure session for the OPC Unified Architecture server and client. Then, the test verification platform is implemented to verify the feasibility of the scheme. The result shows that the mechanism is feasible, and the system security and availability are effectively improved.


Sign in / Sign up

Export Citation Format

Share Document