Journal article
Provably repairing the ISO/IEC 9798 standard for entity authentication
- Abstract:
-
We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some that violate even the most basic authentication guarantees. We analyze the cause of these weaknesses, propose repaired versions of the protocols, and provide automated, machine-checked proofs of their correctness. From an engineering perspective, we propose two design principles for security protocols that suffice to prevent all the weaknesses. Moreover, we show how modern verification tools can be used for the falsification and certified verification of security standards. Based on our findings, the ISO working group responsible for the ISO/IEC 9798 standard has released an updated version of the standard.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 456.6KB, Terms of use)
-
- Publisher copy:
- 10.3233/JCS-130472
Authors
- Publisher:
- IOS Press
- Journal:
- Journal of Computer Security More from this journal
- Volume:
- 21
- Issue:
- 06
- Pages:
- 817-846
- Publication date:
- 2013-12-20
- DOI:
- ISSN:
-
0926-227X
- Language:
-
English
- Pubs id:
-
pubs:453082
- UUID:
-
uuid:8be5817c-b5e3-46d2-ae58-36ce0da82c3b
- Local pid:
-
pubs:453082
- Source identifiers:
-
453082
- Deposit date:
-
2017-01-03
Terms of use
- Copyright holder:
- IOS Press
- Copyright date:
- 2013
- Rights statement:
- © IOS Press 2013.
- Notes:
- This is the accepted manuscript version of the article. The final publication is available at IOS Press through https://doi.org/10.3233/JCS-130472
If you are the owner of this record, you can report an update to it here: Report update to this record