Analysis of Cryptographic Protocols AKI, ARPKI and OPT using ProVerif and AVISPA

@article{Shinde2016AnalysisOC,
  title={Analysis of Cryptographic Protocols AKI, ARPKI and OPT using ProVerif and AVISPA},
  author={Amol H. Shinde and A. J. Umbarkar},
  journal={International Journal of Computer Network and Information Security},
  year={2016},
  volume={8},
  pages={34-40}
}
  • Amol H. Shinde, A. Umbarkar
  • Published 8 March 2016
  • Computer Science
  • International Journal of Computer Network and Information Security
In recent years, the area of formal verification of cryptographic protocols became important because of the active intruders. These intruders can find out the flaws in the protocols and can use them to create attacks. To avoid such possible attacks, the protocols must be verified to check if the protocols contain any flaws. The formal verification tools have helped in verifying and correcting the protocols. Various tools are available these days for verifying the protocols. In this paper, the… Expand
3 Citations
Security Analysis of Wireless Authentication Protocols
  • A. Joshi, A. Mohapatra
  • Computer Science
  • International Journal of Sensors, Wireless Communications and Control
  • 2019
TLDR
This research validates that using password based protocols (PAP) is faster in terms of execution time as compared to other methods, usage of nonces tackles the replay attack and DIAMETER is secure than RADIUS. Expand
An Identity-based Blind Signature Approach for E-voting System
TLDR
This paper proposes a blind signature scheme using the identity-based cryptosystem and shows that proposed scheme is more suitable for E-voting system as compared with others ID-basedblind signature scheme. Expand
A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis
TLDR
A new protocol for the generation and the distribution of cryptographic keys in Wireless Body Area Networks, based on the use of biometrics (ElectroCardioGram), that will enable generating and distributing, reliably and securely, symmetric cryptographic keys. Expand

References

SHOWING 1-10 OF 15 REFERENCES
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
TLDR
The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif or the Avispa tools, which have shown to be effective at finding attacks on protocols or establishing correctness of protocols. Expand
ARPKI: Attack Resilient Public-Key Infrastructure
TLDR
ARPKI is the first such infrastructure that systematically takes into account requirements identified by previous research, and it is co-designed with a formal model, and its core security property is verified using the Tamarin prover. Expand
Automated analysis of cryptographic protocols using Mur/spl phi/
TLDR
The efficiency of Mur/spl phi/ allows us to examine multiple terms of relatively short protocols, giving us the ability to detect replay attacks, or errors resulting from confusion between independent execution of a protocol by independent parties. Expand
Verifying security protocols with Brutus
TLDR
BRUTUS is presented, a tool for verifying properties of security protocols and can be viewed as a special-purpose model checker for security protocols. Expand
Formal methods for cryptographic protocol analysis: emerging issues and trends
  • C. Meadows
  • Computer Science
  • IEEE J. Sel. Areas Commun.
  • 2003
TLDR
Some of the ongoing work in the application of formal methods to cryptographic protocol analysis is described, as well as some of the new challenges and the ways in which they are being met. Expand
Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis
TLDR
A new efficient automatic verification technique, Athena, is proposed, which uses a new efficient representation - the Strand Space Model extension - and utilizes techniques from both model checking and theorem proving approaches to prove the correctness of many security protocols with arbitrary number of concurrent runs. Expand
Automatic verification of correspondences for security protocols
TLDR
A new technique for verifying correspondences in security protocols that can handle an unbounded number of sessions of the protocol, and it significantly extends a previous technique for the verification of secrecy. Expand
Automated Security Protocol Analysis With the AVISPA Tool
TLDR
Experimental results indicate that the AVISPA Tool is a state-of-the-art tool for Internet security protocol analysis as, to the authors' knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability. Expand
The NRL Protocol Analyzer: An Overview
TLDR
An overview of how the NRL Protocol Analyzer works and how the use of the Prolog language benefited the design and implementation of the Analyzer is given. Expand
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
TLDR
This paper proposes AKI as a new public-key validation infrastructure, to reduce the level of trust in CAs, and proposes an architecture for key revocation of all entities through checks-and-balances. Expand
...
1
2
...