Abstract
This paper presents a detailed analysis of the mutual authentication protocol developed especially for the system MobInfoSec - for a mobile device to share and protect classified information. MobInfoSec uses fine-grained access rules described by general access structures. In this paper we describe the architecture and functioning of the system, and the requirements imposed on cryptographic authentication protocols, resulting from both: standards, the collection of good practices, as well as directly from the vision of the system. The article contains a description of the protocol’s parts and formal analysis of its security.
Chapter PDF
Similar content being viewed by others
Keywords
References
Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)
Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer-Verlag, Heidelberg (2003)
Dong, L., Chen, K.: Cryptographic Protocol Security Analysis Based on Trusted Freshness. Springer-Verlag, Heidelberg (2012)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–207 (1983)
El Fray, I., Hyla, T., Kurkowski, M., Maćków, W., Pejaś, J.: Practical authentication protocols for protecting and sharing sensitive information on mobile devices. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds.) CSS 2014. CCIS, vol. 448, pp. 153–165. Springer, Heidelberg (2014)
Hyla, T., Pejaś, J.: Certificate-based encryption scheme with general access structure. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchoń, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 41–55. Springer, Heidelberg (2012)
Hyla, T., Pejaś, J., El Fray, I., Maćków, W., Chocianowicz, W., Szulga, M.: Sensitive information protection on mobile devices using general access structures. In: ICONS 2014, The Ninth International Conference on Systems, pp. 192–196. IARIA (2014)
Hyla, T., Pejaś, J.: A practical certificate and identity based encryption scheme and related security architecture. In: Saeed, K., Chaki, R., Cortesi, A., Wierzchoń, S. (eds.) CISIM 2013. LNCS, vol. 8104, pp. 190–205. Springer, Heidelberg (2013)
Hyla, T., Maćków, W., Pejaś, J.: Implicit and explicit certificates-based encryption scheme. In: Saeed, K., Snášel, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 651–666. Springer, Heidelberg (2014)
Kurkowski, M., Penczek, W.: Verifying Security Protocols Modeled by Networks of Automata. Fund. Inform. 79(3–4), 453–471 (2007)
Lim, C.H., Lee, P.J.: Several practical protocols for authentication and key exchange. Information Processing Letters 53, 91–96 (1995)
Kurkowski, M., Siedlecka-Lamch, O., Szymoniak, S., Piech, H.: Parallel bounded model checking of security protocols. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Waśniewski, J. (eds.) PPAM 2013, Part I. LNCS, vol. 8384, pp. 224–234. Springer, Heidelberg (2014)
Siedlecka-Lamch, O., Kurkowski, M., Piech, H.: A new effective approach for modeling and verification of security protocols. In: Proceedings of 21th international Workshop on Concurrency. Specification and Programming (CS&P 2012), pp. 191–202. Humboldt University Press, Berlin (2012)
Chen, Y.-Y., Lee, R.B.: Hardware-assisted application-level access control. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 363–378. Springer, Heidelberg (2009)
prEN 14890–1 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services (2012)
ISO/IEC 11770–3:2008 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Siedlecka-Lamch, O., El Fray, I., Kurkowski, M., Pejaś, J. (2015). Verification of Mutual Authentication Protocol for MobInfoSec System. In: Saeed, K., Homenda, W. (eds) Computer Information Systems and Industrial Management. CISIM 2015. Lecture Notes in Computer Science(), vol 9339. Springer, Cham. https://doi.org/10.1007/978-3-319-24369-6_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-24369-6_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24368-9
Online ISBN: 978-3-319-24369-6
eBook Packages: Computer ScienceComputer Science (R0)