volume 19 issue 6 pages 609-621

User-mediated authentication protocols and unforgeability in key collision

Britta Hale 1
1
 
Naval Postgraduate School (NPS), Monterey, USA
Publication typeJournal Article
Publication date2019-11-19
scimago Q2
wos Q2
SJR0.753
CiteScore6.3
Impact factor3.2
ISSN16155262, 16155270
Information Systems
Computer Networks and Communications
Software
Safety, Risk, Reliability and Quality
Abstract
User interaction constitutes a largely unexplored field in protocol analysis, even in instances where the user takes an active role as a trusted third party, such as in the Internet of Things (IoT) device initialization protocols. Initializing the formal modeling of 3-party authentication protocols where one party is a physical user, this research introduces the 3-party possession user-mediated authentication (3-PUMA) model. The 3-PUMA model addresses active user participation in a protocol which is designed to authenticate possession of a fixed data string—such as in IoT device commissioning. Using the 3-PUMA model, we provide a computational analysis of the ISO/IEC 9798-6:2010 standard’s Mechanism 7a authentication protocol which includes a user interface and interaction as well as a device-to-device channel. Furthermore, we introduce existential unforgeability under key collision attacks (EUF-KCA) and provide a corresponding security experiment. We show that the security of ISO/IEC 9798-6:2010 Mechanism 7a relies upon EUF-KCA MAC security. Since it is unknown whether any standardized MAC algorithm achieves EUF-KCA security, this research demonstrates a potential vulnerability in the standard.
Found 
Found 

Top-30

Journals

1
Applied Mathematics and Nonlinear Sciences
1 publication, 100%
1

Publishers

1
Walter de Gruyter
1 publication, 100%
1
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
1
Share
Cite this
GOST |
Cite this
GOST Copy
Hale B. User-mediated authentication protocols and unforgeability in key collision // International Journal of Information Security. 2019. Vol. 19. No. 6. pp. 609-621.
GOST all authors (up to 50) Copy
Hale B. User-mediated authentication protocols and unforgeability in key collision // International Journal of Information Security. 2019. Vol. 19. No. 6. pp. 609-621.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.1007/s10207-019-00479-2
UR - https://doi.org/10.1007/s10207-019-00479-2
TI - User-mediated authentication protocols and unforgeability in key collision
T2 - International Journal of Information Security
AU - Hale, Britta
PY - 2019
DA - 2019/11/19
PB - Springer Nature
SP - 609-621
IS - 6
VL - 19
SN - 1615-5262
SN - 1615-5270
ER -
BibTex |
Cite this
BibTex (up to 50 authors) Copy
@article{2019_Hale,
author = {Britta Hale},
title = {User-mediated authentication protocols and unforgeability in key collision},
journal = {International Journal of Information Security},
year = {2019},
volume = {19},
publisher = {Springer Nature},
month = {nov},
url = {https://doi.org/10.1007/s10207-019-00479-2},
number = {6},
pages = {609--621},
doi = {10.1007/s10207-019-00479-2}
}
MLA
Cite this
MLA Copy
Hale, Britta. “User-mediated authentication protocols and unforgeability in key collision.” International Journal of Information Security, vol. 19, no. 6, Nov. 2019, pp. 609-621. https://doi.org/10.1007/s10207-019-00479-2.