Academic Journals Database
Disseminating quality controlled scientific knowledge

Analysis of a key-establishment security protocol

Author(s): Anca Jurcut | Tom Coffey | Reiner Dojen | Robert Gyorodi

Journal: Journal of Computer Science and Control Systems
ISSN 1844-6043

Volume: 1;
Issue: 1;
Start page: 42;
Date: 2008;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Security protocols | protocol flaws | protocol attacks | parallel session attacks

Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and non-repudiation. This paper is concerned with attacks against security protocols. Security protocols are introduced and the most common attacks against security protocols are discussed. The Wide-Mouthed Frog key-establishemnt protocol of Burrows, Abadi and Needham is presented. Attacks which exploit known weaknesses in the protocol are discussed and a corrected version of the protocol by Lowe is presented. Analysis of the Lowe modified Wide-Mouthed Frog protocol in this paper reveals a new parallel session attack. The reasons for this attack and how it can be mounted are discussed.

Tango Rapperswil
Tango Rapperswil

     Affiliate Program