To search, Click below search items.


All Published Papers Search Service


Fast and Automatic Verification of Authentication and Key Exchange Protocols


Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake


Vol. 11  No. 4  pp. 1-13


It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, we proposed the security verification method (OKT method) for the aforementioned protocols based on Bellare et al.'s model (BPR model) and showed the verification points of security properties to verify their security efficiently. However, there is an estrangement between the security of the OKT method and the BPR model. In this paper, we reconsider the OKT method and propose an updated security verification method for authentication and key exchange protocols based on the BPR model. In particular, we revise the procedure of the OKT method to address the aforementioned issue. We show the novel verification points for each security property in the authentication and key exchange protocols in accordance with the aforementioned revisions. In addition, we describe the relations among the six verification points, explain how the proposed method verifies the aforementioned protocols by providing one example and show the validity of the proposed method by verifying the security of 87 authentication and key exchange protocols that were generated automatically


Security Verification Method, Authentication and Key Exchange Protocols, Verification Points, Bellare et al.'s Model