Formally analysing a security protocol for replay attacks

Long, Benjamin W. & Fidge, Colin J. (2006) Formally analysing a security protocol for replay attacks. In Han, Jun & Staples, Mark (Eds.) 17th Australian Software Engineering Conference (ASWEC 2006), 18-21 April 2006, Sydney.

View at publisher

Abstract

The Kerberos-One-Time Protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we suspected a replay attack was possible on the protocol. To check this, we formally specified the protocol using Object-Z and then analysed its behaviour in the presence of an attacker using the Symbolic Analysis Laboratory’s model checker. To produce accurate results efficiently, our formalism included an abstraction of the protocol’s data structures that captured just those characteristics that we believed made the protocol vulnerable. Ultimately, the model checker’s analysis confirmed our suspicions about the protocol’s weakness.

Impact and interest:

1 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

711 since deposited on 08 Nov 2006
79 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 5406
Item Type: Conference Paper
Refereed: Yes
Keywords: Information security, Networking, Security protocols, Model checking
DOI: 10.1109/ASWEC.2006.30
ISBN: 0769525512
ISSN: 1530-0803
Divisions: Past > QUT Faculties & Divisions > Faculty of Science and Technology
Past > Institutes > Information Security Institute
Copyright Owner: Copyright 2006 IEEE
Copyright Statement: Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Deposited On: 08 Nov 2006 00:00
Last Modified: 29 Feb 2012 13:23

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page