کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
438552 690290 2006 23 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Injective synchronisation: An extension of the authentication hierarchy
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Injective synchronisation: An extension of the authentication hierarchy
چکیده انگلیسی

Authentication is one of the foremost goals of many security protocols. It is most often formalised as a form of agreement, which expresses that the communicating partners agree on the values of a number of variables. In this paper we formalise and study an intensional form of authentication which we call synchronisation. Synchronisation expresses that the messages are transmitted exactly as prescribed by the protocol description. Synchronisation is a strictly stronger property than agreement for the standard intruder model, because it can be used to detect preplay attacks. In order to prevent replay attacks on simple protocols, we also define injective synchronisation. Given a synchronising protocol, we show that a sufficient syntactic criterion exists that guarantees that the protocol is injective as well.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Theoretical Computer Science - Volume 367, Issues 1–2, 24 November 2006, Pages 139-161