Learn More
Non-repudiation allows an exchange of data between two principals in such a manner that the principals cannot subsequently deny their participation in the exchange. Current non-repudiation schemes, while providing a mandatory <i>proof of origin</i> service, generally provide only discretionary <i>proof of receipt</i> since it is difficult to enforce the(More)
Security communication protocols generally start with an authentication phase where the identities of the involved parties are established. Next a session key is generated for use with some symmetric cryptographic algorithm to secure the actual transmission. In addition to the above, a mobile system may also require location privacy, link-security and/or(More)
– Many of the diverse Wireless Sensor Network (WSN) applications, such as home automation, traffic control and medical patient monitoring, have a strong requirement for the confidentiality of sensing data. At the same time, the restricted resources of WSN nodes demand that applications are implemented as efficiently as possible. Recently, the Advanced(More)
The increasing usage of internet-based services, such as certified e-mails, electronic payment of goods, and non-repudiation require development of security protocols for fair exchange. Non-repudiation is a security service concerned with preventing a denial by one of the principals involved in a communication of having participated in all or part of the(More)
Cryptographic protocols are designed to provide security services, such as key distribution, authentication and non-repudiation, over insecure networks. Formal verification of these protocols is an important step in their design. The manual verification of security protocols using logic-based formal methods is susceptible to human-factor errors in correctly(More)
Nowadays mobile and fixed networks are trusted with highly sensitive information, which must be protected by security protocols. However, security protocols are vulnerable to a host of subtle attacks, such as replay, parallel session and type-flaw attacks. Designing protocols to be impervious to these attacks has been proven to be extremely challenging and(More)
Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of(More)
Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application of formal techniques is highly involved, software has been developed in order to facilitate protocol verification. Protocol weaknesses or flaws can thus be identified and corrected(More)