Designing an Authentication Protocol via Authentication Test
2007
The proving process of protocol with authentication test suggests a design process of a proper authentication protocol. This paper inherits the idea of designing protocols via authentication test, and then describes the thought and procedure of designing protocols in terms of authentication test from protocol analyzing standpoint. We construct a new bilateral authentication and key negotiation protocol KNP under these rules. Bringing authentication test to protocol designing has opened up a new space in the application of authentication test, and this will contribute to understanding of protocol security attributes.
Keywords:
- Protected Extensible Authentication Protocol
- Challenge-Handshake Authentication Protocol
- Computer network
- Distributed computing
- Lightweight Extensible Authentication Protocol
- Challenge–response authentication
- Wide Mouth Frog protocol
- Otway–Rees protocol
- Email authentication
- Authentication protocol
- Computer science
- Computer security
- Data Authentication Algorithm
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
10
References
0
Citations
NaN
KQI