Verifying and fixing password authentication protocolMa, X.Q., McCrindle, R. and Cheng, X.C. (2006) Verifying and fixing password authentication protocol. In: Song, Y. T. and Lu, C. (eds.) SNPD 2006: Seventh ACIS International Conference on Software Engineering Artificial Intelligence, Networking, and Parallel/Distributed Computing, Proceedings. IEEE, Los Alamitos, pp. 324-329. ISBN 076952611X Full text not archived in this repository. It is advisable to refer to the publisher's version if you intend to cite from this work. See Guidance on citing. Abstract/SummaryPassword Authentication Protocol (PAP) is widely used in the Wireless Fidelity Point-to-Point Protocol to authenticate an identity and password for a peer. This paper uses a new knowledge-based framework to verify the PAP protocol and a fixed version. Flaws are found in both the original and the fixed versions. A new enhanced protocol is provided and the security of it is proved The whole process is implemented in a mechanical reasoning platform, Isabelle. It only takes a few seconds to find flaws in the original and the fixed protocol and to verify that the enhanced version of the PAP protocol is secure.
Altmetric Deposit Details University Staff: Request a correction | Centaur Editors: Update this record |