Open Access Open Access  Restricted Access Subscription Access

"Fast & Automatic Verification of Authentication & Key Exchange Protocol"


Affiliations
1 Takshshila Institute of Engineering & Technology, Jabalpur, India
 

In this paper we introduce the automatic verification of authentication & key exchange protocol its name suggest/show the paper summery now It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, we proposed the automatic security verification method for the protocols based on Bellaire et al.'s model and showed the verification points of security properties to verify their security efficiently. We show the novel verification points for each security property in the authentication and key exchange protocols in accordance with the aforementioned revisions. In addition, we describe the relations among the six verification points, explain how the proposed method verifies the aforementioned protocols by providing one example and show the validity of the proposed method by verifying the security challenges.

Keywords

Protocol, Verification, Authentication, Key Exchanging Startges, Security Verification Method.
User
Notifications
Font Size

Abstract Views: 111

PDF Views: 0




  • "Fast & Automatic Verification of Authentication & Key Exchange Protocol"

Abstract Views: 111  |  PDF Views: 0

Authors

Naresh Chetwani
Takshshila Institute of Engineering & Technology, Jabalpur, India

Abstract


In this paper we introduce the automatic verification of authentication & key exchange protocol its name suggest/show the paper summery now It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, we proposed the automatic security verification method for the protocols based on Bellaire et al.'s model and showed the verification points of security properties to verify their security efficiently. We show the novel verification points for each security property in the authentication and key exchange protocols in accordance with the aforementioned revisions. In addition, we describe the relations among the six verification points, explain how the proposed method verifies the aforementioned protocols by providing one example and show the validity of the proposed method by verifying the security challenges.

Keywords


Protocol, Verification, Authentication, Key Exchanging Startges, Security Verification Method.