Abstract
We suggest a new methodology for design and analysis of key exchange protocols. The basic idea is to establish the minimum cryptographic requirements in delivering a new session key, and to identify how these are achieved in the protocol under examination. The method is therefore limited to key exchange protocols and to establishing that the basic properties exist. The method is easy to carry out by hand (although some existing protocols may be difficult to handle). It allows existing protocols to be re-designed and new protocols designed in a flexible manner. A number of new protocols designed with the method are suggested.
This work is funded by the UK Engineering and Physical Sciences Research Council under research grant GR/G19787.
Preview
Unable to display preview. Download preview PDF.
References
M.Burrows, M.Abadi, and R.Needharn, A Logic of Authentication, Proceedings of the Royal Society, Vol A426,pp 233–271, 1989.
Colin Boyd, Security Architectures using Formal Methods, IEEE Journal on Selected Areas in Communications, June 1993, pp.694–701.
Colin Boyd and Wenbo Mao, On a Limitation of BAN logic, Advances in Cryptology — Eurocrypt 93, Springer-Verlag, 1994, pp.240–247.
Colin Boyd and Wenbo Mao, Designing Secure Key Exchange Protocols, Proceedings of ESORICS 94, Springer-Verlag, 1994, pp.93–105.
D.W.Davies and W.L.Price, Security for Computer Networks, John Wiley and Sons, 1989
D.E.Denning and G.M.Sacco, Timestamps in Key Distribution Protocols, Communications of the ACM, 24, 8, 1981, pp. 533–536.
Whitfield Diffie, Paul C. van Oorshot and Michael J. Wiener, Authentication and Authenticated Key Exchanges, Designs, Codes and Cryptography, 2, pp. 107–125, 1992.
W.Diffie and M.Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, IT-22, 6, November 1976, pp. 644–654.
R.Kemmerer, C.Meadows and J.Millen, Three Systems for Cryptographic Protocol Analysis, Journal of Cryptology, 7, 2, Spring 1994, pp. 79–130.
Wenbo Mao and Colin Boyd, Design of Authentication Protocols: Some Misconceptions and a New Approach, Proceedings of IEEE Computer Security Foundations Workshop VII, 1994.
R.M.Needham and M.D.Schroeder, Using Encryption for Authentication in Large Networks of Computers, Communications of the ACM, 21, 12, December 1978, pp. 993–999.
Dave Otway and Owen Rees, Efficient and Timely Mutual Authentication, ACM Operating Systems Review, 21, 1,pp. 8–10, 1987.
Paul C. van Oorschot, Extending Cryptographic Logics of Belief to Key Agreement Protocols, Proceeedings of the 1st ACM Conference on Communications and Computer Seurity, Faixfax Virginia, November 1993.
Darryl M. Stahl, Stafford E.Tavares and Henk Meijer, Backward State Analysis of Cryptographic Protocols Using Coloured Petri Nets, Workshop on Selected Areas in Cryptography, Canada, 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Boyd, C., Mao, W. (1995). Design and analysis of key exchange protocols via secure channel identification. In: Pieprzyk, J., Safavi-Naini, R. (eds) Advances in Cryptology — ASIACRYPT'94. ASIACRYPT 1994. Lecture Notes in Computer Science, vol 917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0000433
Download citation
DOI: https://doi.org/10.1007/BFb0000433
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-59339-3
Online ISBN: 978-3-540-49236-8
eBook Packages: Springer Book Archive