Presentation 2006-11-10
Verification Methods for Security Protocols (1) : Typical Errors in Security Proofs for Key Exchange Protocols
Kenji IMAMOTO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Although several mathematical approaches for proving security of a protocol have been proposed so far, since high knowledge on mathematical is required to understand proof, insecure protocols are sometimes regarded as secure one (due to their misunderstood proof). This paper introduces a key exchange protocol proposed by Boyd et al. [3] as an example, and shows what kind of error/attack exists.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Proveable security / key exchange protocol / proof error
Paper # AI2006-16
Date of Issue

Conference Information
Committee AI
Conference Date 2006/11/3(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Artificial Intelligence and Knowledge-Based Processing (AI)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Verification Methods for Security Protocols (1) : Typical Errors in Security Proofs for Key Exchange Protocols
Sub Title (in English)
Keyword(1) Proveable security
Keyword(2) key exchange protocol
Keyword(3) proof error
1st Author's Name Kenji IMAMOTO
1st Author's Affiliation Faculty of Information Science and Electrical Engineering, Kyushu University()
Date 2006-11-10
Paper # AI2006-16
Volume (vol) vol.106
Number (no) 340
Page pp.pp.-
#Pages 4
Date of Issue