Sciweavers

ISICT
2003

Analysis of a mobile communication security protocol

14 years 27 days ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle design flaws. Formal verification techniques provide rigid and thorough means to evaluate security protocols. This paper demonstrates the process of formal verification by applying a logic to a security protocol intended for use in mobile communications. As a result of the verification, 8 failed protocol goals are identified. Further, a new attack on the protocol is outlined. The presence of weaknesses in published protocols highlights the importance of formal verification to prevent insecure protocols reaching the public domain.
Tom Coffey, Reiner Dojen
Added 31 Oct 2010
Updated 31 Oct 2010
Type Conference
Year 2003
Where ISICT
Authors Tom Coffey, Reiner Dojen
Comments (0)