Chapter 27: Analyses of authentication protocols

Abstract

This chapter introduces the modeling of authentication protocols based on truly concurrent process algebra.

Keywords

Authentication Protocols; Process Algebra; True Concurrency

An authentication protocol is used to verify the principal's identity, including verification of one principal's identity and mutual verifications of more that two principals' identities. We omit some quite simple authentication protocols, including authentication using one-way functions, etc. We will analyze mutual authentication using the interlock protocol against man-in-the-middle attack in Section 27.1, and SKID in Section 27.2.

27.1 Mutual authentication using the interlock protocol

The mutual authentication using ...

Get Handbook of Truly Concurrent Process Algebra now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.