User-mediated authentication protocols and unforgeability in key collision
1
Naval Postgraduate School (NPS), Monterey, USA
|
Publication type: Journal Article
Publication date: 2019-11-19
scimago Q2
wos Q2
SJR: 0.753
CiteScore: 6.3
Impact factor: 3.2
ISSN: 16155262, 16155270
Information Systems
Computer Networks and Communications
Software
Safety, Risk, Reliability and Quality
Abstract
User interaction constitutes a largely unexplored field in protocol analysis, even in instances where the user takes an active role as a trusted third party, such as in the Internet of Things (IoT) device initialization protocols. Initializing the formal modeling of 3-party authentication protocols where one party is a physical user, this research introduces the 3-party possession user-mediated authentication (3-PUMA) model. The 3-PUMA model addresses active user participation in a protocol which is designed to authenticate possession of a fixed data string—such as in IoT device commissioning. Using the 3-PUMA model, we provide a computational analysis of the ISO/IEC 9798-6:2010 standard’s Mechanism 7a authentication protocol which includes a user interface and interaction as well as a device-to-device channel. Furthermore, we introduce existential unforgeability under key collision attacks (EUF-KCA) and provide a corresponding security experiment. We show that the security of ISO/IEC 9798-6:2010 Mechanism 7a relies upon EUF-KCA MAC security. Since it is unknown whether any standardized MAC algorithm achieves EUF-KCA security, this research demonstrates a potential vulnerability in the standard.
Found
Nothing found, try to update filter.
Found
Nothing found, try to update filter.
Top-30
Journals
|
1
|
|
|
Applied Mathematics and Nonlinear Sciences
1 publication, 100%
|
|
|
1
|
Publishers
|
1
|
|
|
Walter de Gruyter
1 publication, 100%
|
|
|
1
|
- We do not take into account publications without a DOI.
- Statistics recalculated weekly.
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
1
Total citations:
1
Citations from 2024:
0
Cite this
GOST |
RIS |
BibTex |
MLA
Cite this
GOST
Copy
Hale B. User-mediated authentication protocols and unforgeability in key collision // International Journal of Information Security. 2019. Vol. 19. No. 6. pp. 609-621.
GOST all authors (up to 50)
Copy
Hale B. User-mediated authentication protocols and unforgeability in key collision // International Journal of Information Security. 2019. Vol. 19. No. 6. pp. 609-621.
Cite this
RIS
Copy
TY - JOUR
DO - 10.1007/s10207-019-00479-2
UR - https://doi.org/10.1007/s10207-019-00479-2
TI - User-mediated authentication protocols and unforgeability in key collision
T2 - International Journal of Information Security
AU - Hale, Britta
PY - 2019
DA - 2019/11/19
PB - Springer Nature
SP - 609-621
IS - 6
VL - 19
SN - 1615-5262
SN - 1615-5270
ER -
Cite this
BibTex (up to 50 authors)
Copy
@article{2019_Hale,
author = {Britta Hale},
title = {User-mediated authentication protocols and unforgeability in key collision},
journal = {International Journal of Information Security},
year = {2019},
volume = {19},
publisher = {Springer Nature},
month = {nov},
url = {https://doi.org/10.1007/s10207-019-00479-2},
number = {6},
pages = {609--621},
doi = {10.1007/s10207-019-00479-2}
}
Cite this
MLA
Copy
Hale, Britta. “User-mediated authentication protocols and unforgeability in key collision.” International Journal of Information Security, vol. 19, no. 6, Nov. 2019, pp. 609-621. https://doi.org/10.1007/s10207-019-00479-2.