Font Size: a A A

Analysis And Design Of Authentication Protocols

Posted on:1999-05-11Degree:DoctorType:Dissertation
Country:ChinaCandidate:J B TianFull Text:PDF
GTID:1118359942950004Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Authentication protocol is an important secure measure in mobile communication network and computer network. A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network. It is a valuable filed on how to design the correct protocol in various environments. Among the analysis tools for authentication, formal analysis play important role due to its objectivity and correctness. BAN logic is widely used and studied in formal analysis due to its simplicity and efficiency. The two aspects of designing and analyzing of authentication protocol are studied and the main research results are as follows:?The BAN-Like logic proposed by Wenbo Mao is studied. and the ambiguity in the logic caused by the introduction of the concept of 搘hat the principal can not see? which has not correspond semantic is discussed. An example is given to demonstrate the limitation of the logic.?The method of protocol idealization using cascade between the nonce and authentication principal is made perfect.?An extensive BAN logic which is suitable for the analysis for public-key authentication protocols is proposed.?The five criteria to design authentication protocol using BA1N logic are proposed and basic messages structure according to the criteria are presented and an authentication protocol is designed using the basic messages.?Authentication protocols for mobile communication are analyzed using BAN logic and the Beller-Yacobi protocol is shown to be a good authentication protocol for mobiLe communication. The authentication protocol for mobile communication system using one-time public-key certification is designed and its correctness is proven by BAN logic.?The problem of anonymity is studied and an authentication protocols of mobile user which is anonymity to both visited domain and other mobile users is proposed.
Keywords/Search Tags:Authentication protocols BAN logic~ Mobile communication Computer network ~. Secuflty~ Anonymity
PDF Full Text Request
Related items