Verifying and fixing password authentication protocol

Full text not archived in this repository.

Please see our End User Agreement.

It is advisable to refer to the publisher's version if you intend to cite from this work. See Guidance on citing.

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Ma, X.Q., McCrindle, R. and Cheng, X.C. (2006) Verifying and fixing password authentication protocol. In: Song, Y. T. and Lu, C. (eds.) SNPD 2006: Seventh ACIS International Conference on Software Engineering Artificial Intelligence, Networking, and Parallel/Distributed Computing, Proceedings. IEEE, Los Alamitos, pp. 324-329. ISBN 076952611X

Abstract/Summary

Password Authentication Protocol (PAP) is widely used in the Wireless Fidelity Point-to-Point Protocol to authenticate an identity and password for a peer. This paper uses a new knowledge-based framework to verify the PAP protocol and a fixed version. Flaws are found in both the original and the fixed versions. A new enhanced protocol is provided and the security of it is proved The whole process is implemented in a mechanical reasoning platform, Isabelle. It only takes a few seconds to find flaws in the original and the fixed protocol and to verify that the enhanced version of the PAP protocol is secure.

Item Type Book or Report Section
URI https://reading-clone.eprints-hosting.org/id/eprint/14424
Divisions Life Sciences > School of Biological Sciences > Department of Bio-Engineering
Publisher IEEE
Download/View statistics View download statistics for this item

University Staff: Request a correction | Centaur Editors: Update this record

Search Google Scholar