Analysis of Cryptographic Protocols AKI, ARPKI and OPT using ProVerif and AVISPA

@article{Shinde2016AnalysisOC,
  title={Analysis of Cryptographic Protocols AKI, ARPKI and OPT using ProVerif and AVISPA},
  author={Amol H. Shinde and A. J. Umbarkar},
  journal={International Journal of Computer Network and Information Security},
  year={2016},
  volume={8},
  pages={34-40}
}
  • Amol H. ShindeA. Umbarkar
  • Published 8 March 2016
  • Computer Science, Mathematics
  • International Journal of Computer Network and Information Security
In recent years, the area of formal verification of cryptographic protocols became important because of the active intruders. These intruders can find out the flaws in the protocols and can use them to create attacks. To avoid such possible attacks, the protocols must be verified to check if the protocols contain any flaws. The formal verification tools have helped in verifying and correcting the protocols. Various tools are available these days for verifying the protocols. In this paper, the… 

Figures and Tables from this paper

Security Analysis of Wireless Authentication Protocols

  • A. JoshiA. Mohapatra
  • Computer Science
    International Journal of Sensors, Wireless Communications and Control
  • 2019
This research validates that using password based protocols (PAP) is faster in terms of execution time as compared to other methods, usage of nonces tackles the replay attack and DIAMETER is secure than RADIUS.

OAuth 2.0 protocol optimization based on CPK technology

The authorization and delegation function of oauth2.0 protocol is discussed, and it is proposed that the access credentials issued by the subject authorization server are transmitted in JWT structured token format, and a handshake is added between the authorization server and the resource server to strengthen mutual authentication among servers.

An Identity-based Blind Signature Approach for E-voting System

This paper proposes a blind signature scheme using the identity-based cryptosystem and shows that proposed scheme is more suitable for E-voting system as compared with others ID-basedblind signature scheme.

References

SHOWING 1-10 OF 15 REFERENCES

The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols

The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif or the Avispa tools, which have shown to be effective at finding attacks on protocols or establishing correctness of protocols.

Automated analysis of cryptographic protocols using Mur/spl phi/

The efficiency of Mur/spl phi/ allows us to examine multiple terms of relatively short protocols, giving us the ability to detect replay attacks, or errors resulting from confusion between independent execution of a protocol by independent parties.

Verifying security protocols with Brutus

BRUTUS is presented, a tool for verifying properties of security protocols and can be viewed as a special-purpose model checker for security protocols.

Formal methods for cryptographic protocol analysis: emerging issues and trends

  • C. Meadows
  • Computer Science
    IEEE J. Sel. Areas Commun.
  • 2003
Some of the ongoing work in the application of formal methods to cryptographic protocol analysis is described, as well as some of the new challenges and the ways in which they are being met.

Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis

A new efficient automatic verification technique, Athena, is proposed, which uses a new efficient representation - the Strand Space Model extension - and utilizes techniques from both model checking and theorem proving approaches to prove the correctness of many security protocols with arbitrary number of concurrent runs.

Automatic verification of correspondences for security protocols

  • B. Blanchet
  • Computer Science, Mathematics
    J. Comput. Secur.
  • 2009
A new technique for verifying correspondences in security protocols that can handle an unbounded number of sessions of the protocol, and it significantly extends a previous technique for the verification of secrecy.

The NRL Protocol Analyzer: An Overview

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure

This paper proposes AKI as a new public-key validation infrastructure, to reduce the level of trust in CAs, and proposes an architecture for key revocation of all entities through checks-and-balances.

The TAMARIN Prover for the Symbolic Analysis of Security Protocols

The Tamarin prover supports the automated, unbounded, symbolic analysis of security protocols. It features expressive languages for specifying protocols, adversary models, and properties, and support