85
E-Commerce, E-Business and E-Service – Lee (Ed)
© 2014 Taylor & Francis Group, London, ISBN 978-1-138-02646-9
Formal analysis and verification of a new improved NSSK protocol
Guangtian Shi & Huili Chen
Lanzhou Jiaotong University, Lanzhou, P.R. China
ABSTRACT: Authentication protocols are the basis of network security. Needham-Schroeder Shared-
Key (NSSK) protocol is considered as one of the earliest and classical authentication protocol. This paper
introduces NSSK protocol, analyzes its security, and proposes an improved NSSK protocol. Also mod-
eling and verification the security of protocol within the framework of CSP and its model-checking tool
FDR. The results of the analysis show that the proposed protocol can achieves the expectative authentica- ...