scholarly journals Generalized Unsolicited Tests for Authentication Protocol Analysis

Author(s):  
Yongjian Li ◽  
Jun Pang
2014 ◽  
Vol 989-994 ◽  
pp. 4698-4703
Author(s):  
Chao Zhang ◽  
Yu Wang

To discover the existing or possibly existing vulnerability of present authentication protocol, we proposed a structure of authentication protocol analysis, which consist of white box analysis, black box analysis and indicator system as the three main functional components. White box analysis makes use of the transformation from MSCs (Message Sequence Charts) to Promela (Process Meta Language), the input language of the remarkable model checker SPIN; black box analysis is based on the attack platform of authentication protocol analysis; indicator system is decided by deducibility restraint methods. Compared with the UML modeling methods based on Promela, the MSC2Promela methods we figured out on the context have more advantages than its disadvantages. Finally, we proposed a structure of authentication protocol analysis based on the transformation from MSC2Promela, which makes sense to the later work on the area of authentication protocol analysis.


2021 ◽  
Author(s):  
Jiawen Song ◽  
Meihua Xiao ◽  
Tong Zhang ◽  
Haoyang Zhou

AbstractPUF (Physical unclonable function) is a new hardware security primitive, and the research on PUFs is one of the emerging research focuses. For PUF-based mutual authentication protocols, a method to abstract the security properties of hardware by using logic of events is proposed, and the application aspects of logic of events are extended to protocols based on hardware security. With the interaction of PUF-based mutual authentication protocol formally described by logic of events, the basic sequences are constructed and the strong authentication property in protocol interaction process is verified. Based on the logic of events, the freshness of nonces is defined, and the persist rule is proposed according to the concept of freshness, which ensures the consistency of the protocol state and behavior predicate in the proof process, and reduces the complexity and redundancy in the protocol analysis process. Under reasonable assumptions, the security of the protocol is proven, and the fact that logic of events applies to PUF-based mutual authentication protocols is shown.


1985 ◽  
Vol 30 (5) ◽  
pp. 373-375
Author(s):  
Robert L. Mack

2017 ◽  
Vol 14 (1) ◽  
pp. 67
Author(s):  
Fadila Mohd Yusof ◽  
Azmir Mamat Nawi ◽  
Azhari Md Hashim ◽  
Ahmad Fazlan Ahmad Zamri ◽  
Abu Hanifa Ab Hamid ◽  
...  

Design development is one of the processes in the teaching and learning of industrial design. This process is important during the early stage of ideas before continuing to the next design stage. This study was conducted to investigate the comparison between  academic  syllabus  and  industry  practices  whether  these  processes  are  highly dependent on the idea generation and interaction related to the designer or to the student itself. The data were gathered through an observation of industry practice during conceptual design phase, teaching and learning process in academic through Video Protocol Analysis (VPA) method and interviews with industry practitioners via structured and unstructured questionnaires. The data were analysed by using NVivo software in order to formulate the results. The findings may possibly contribute to the teaching and learning processes especially in the improvement of industrial design syllabus in order to meet the industry demands. Keywords: design development, industrial design, industry demands


2019 ◽  
Vol 15 (4) ◽  
pp. 784-794
Author(s):  
N.V. Kormil'tsev ◽  
◽  
A.D. Uvarov ◽  
A.A. Mikhailov ◽  
M.V. Tumbinskaya ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document