Journal article
Rational authentication protocols
- Abstract:
- We use ideas from game theory to transform two families of authentication protocols so that even an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particularly useful in resisting or discouraging a powerful and rational intruder (as present in military applications) who makes many attempts to break a protocol because (1) even the intruder fails, a denial of service attack is still mounted successfully, and (2) in a password-based protocol, the chance of a successful attack increases quite significantly as more and more attempts are launched to guess the password.
Actions
Authors
- Publication date:
- 2011-01-01
- UUID:
-
uuid:67b35c28-de0f-42be-8262-9e05446c6343
- Local pid:
-
cs:4588
- Deposit date:
-
2015-03-31
Terms of use
- Copyright date:
- 2011
If you are the owner of this record, you can report an update to it here: Report update to this record