Accessibility navigation


Verifying and fixing password authentication protocol

Ma, X.Q., McCrindle, R. and Cheng, X.C. (2006) Verifying and fixing password authentication protocol. In: Song, Y. T. and Lu, C. (eds.) SNPD 2006: Seventh ACIS International Conference on Software Engineering Artificial Intelligence, Networking, and Parallel/Distributed Computing, Proceedings. IEEE, Los Alamitos, pp. 324-329. ISBN 076952611X

Full text not archived in this repository.

It is advisable to refer to the publisher's version if you intend to cite from this work. See Guidance on citing.

Abstract/Summary

Password Authentication Protocol (PAP) is widely used in the Wireless Fidelity Point-to-Point Protocol to authenticate an identity and password for a peer. This paper uses a new knowledge-based framework to verify the PAP protocol and a fixed version. Flaws are found in both the original and the fixed versions. A new enhanced protocol is provided and the security of it is proved The whole process is implemented in a mechanical reasoning platform, Isabelle. It only takes a few seconds to find flaws in the original and the fixed protocol and to verify that the enhanced version of the PAP protocol is secure.

Item Type:Book or Report Section
Divisions:Life Sciences > School of Biological Sciences > Department of Bio-Engineering
ID Code:14424
Publisher:IEEE

University Staff: Request a correction | Centaur Editors: Update this record

Page navigation