{"title":"Prerequisites to authentication protocols proved by binding theory","authors":"HaiFeng Xue","doi":"10.1109/GRC.2009.5255038","DOIUrl":null,"url":null,"abstract":"The paper proposes a binding theory and security prerequisites proposition to authentication protocols. The binding theory constructs a formal theory model by which can quickly infer some security properties. Binding theory comes from the basic ideas that the key used in cryptographic protocols is the kernel component for the security protocols. Based on binding theory, security prerequisites proposition to authentication protocols is modeled and proved. Binding theory and security prerequisites proposition to authentication protocols can simply and efficiently decide security properties when authentication protocols have security weakness for authentication properties. Some classical security protocols are taken as examples to infer and discover some of their security properties broken by binding theory and security prerequisites proposition.","PeriodicalId":388774,"journal":{"name":"2009 IEEE International Conference on Granular Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Granular Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GRC.2009.5255038","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The paper proposes a binding theory and security prerequisites proposition to authentication protocols. The binding theory constructs a formal theory model by which can quickly infer some security properties. Binding theory comes from the basic ideas that the key used in cryptographic protocols is the kernel component for the security protocols. Based on binding theory, security prerequisites proposition to authentication protocols is modeled and proved. Binding theory and security prerequisites proposition to authentication protocols can simply and efficiently decide security properties when authentication protocols have security weakness for authentication properties. Some classical security protocols are taken as examples to infer and discover some of their security properties broken by binding theory and security prerequisites proposition.