Academic Journals Database
Disseminating quality controlled scientific knowledge

Security Protocol Design: A Case Study Using Key Distribution Protocols

Author(s): Anca Jurcut | Tom Coffey | Reiner Dojen | Robert Gyorodi

Journal: Journal of Computer Science and Control Systems
ISSN 1844-6043

Volume: 2;
Issue: 2;
Start page: 16;
Date: 2009;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Security protocols | protocol weaknesses | protocol attacks | freshness attacks | parallel session attacks | design guidelines for security protocols

Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona