Corpus ID: 53664288

A Formal Analysis of 5 G Authentication

@inproceedings{Basin2018AFA,
  title={A Formal Analysis of 5 G Authentication},
  author={David Basin and Jannik Dreier and Lucca Hirschi and Sasa Radomirovic and Ralf Sasse and Vincent Stettler},
  year={2018}
}
  • David Basin, Jannik Dreier, +3 authors Vincent Stettler
  • Published 2018
  • Mobile communication networks connect much of the world’s population. The security of users’ calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose. We provide the first comprehensive formal model of a protocol from the AKA family: 5GAKA.We also extract precise requirements from the 3GPP standards defining 5G and we identify… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Figures and Tables from this paper.

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 30 REFERENCES

    A Formal Analysis of 5G Authentication

    VIEW 10 EXCERPTS

    Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

    VIEW 4 EXCERPTS

    Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif

    • Bruno Blanchet
    • Mathematics, Computer Science
    • Foundations and Trends in Privacy and Security
    • 2016
    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Tamarin models, proofs and instructions for reproducibility. https://github.com/tamarin-prover/tamarin-prover/tree/develop/examples/ ccs18-5G

    • David Basin, Jannik Dreier, +3 authors Vincent Stettler
    • 2018
    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    Authentication vulnerability in the most recent 5G AKA drafts (February 2018)

    • Martin Dehnel-Wild, Cas Cremers
    • 2018
    VIEW 1 EXCERPT

    DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice

    VIEW 1 EXCERPT