Sciweavers

AFRICACRYPT
2009
Springer

Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps

14 years 6 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this technique to two of the most popular models adopted in literature (Bellare-Rogaway and Canetti-Krawczyk). We analyse previous results obtained using these models in light of the proposed extensions, and demonstrate their application to a new class of protocols. In the timed CK model we concentrate on modular design and analysis of protocols, and propose a more efficient timed authenticator relying on timestamps. The structure of this new authenticator implies that an authentication mechanism standardised in ISO-9798 is secure. Finally, we use our timed extension to the BR model to establish the security of an efficient ISO protocol for key transport and unilateral entity authentication. Keywords. Timestamp, Key Agreement, Entity Authentication.
Manuel Barbosa, Pooya Farshim
Added 19 May 2010
Updated 19 May 2010
Type Conference
Year 2009
Where AFRICACRYPT
Authors Manuel Barbosa, Pooya Farshim
Comments (0)