About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Demarcation of Security in Authentication Protocols

In 2011 First Syssec Workshop (syssec) — 2011, pp. 43-50
From

Embedded Systems Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark1

Department of Informatics and Mathematical Modeling, Technical University of Denmark2

Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models.

Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive.

A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other authentication goals, the correctness requirements, can be derived from the binding sequence.

Language: English
Publisher: IEEE
Year: 2011
Pages: 43-50
Proceedings: 1st SysSec Workshop
ISBN: 1457715287 and 9781457715280
Types: Conference paper
DOI: 10.1109/SysSec.2011.13
ORCIDs: Jensen, Christian D.

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis