Skip to main content

On Establishing and Fixing a Parallel Session Attack in a Security Protocol

  • Conference paper
Intelligent Distributed Computing, Systems and Applications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 162))

Summary

Nowadays mobile and fixed networks are trusted with highly sensitive information, which must be protected by security protocols. However, security protocols are vulnerable to a host of subtle attacks, such as replay, parallel session and type-flaw attacks. Designing protocols to be impervious to these attacks has been proven to be extremely challenging and error prone.

This paper discusses various attacks against security protocols. As an example, the security of the Wide-Mouthed Frog key distribution protocol when subjected to known attacks is discussed. Significantly, a hitherto unknown attack on Lowe’s modified version of the Wide-Mouthed Frog protocol is presented. Finally, a correction for the protocol to prevent this attack is proposed and discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boyd, C., Mathuria, A.: Protocols for authentication and key establishment. Springer, Berlin (2003)

    Google Scholar 

  2. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems TOCS 8(1), 18–36 (1990)

    Article  Google Scholar 

  3. Lowe, G.: An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters 56(3), 131–136 (1995)

    Article  MATH  Google Scholar 

  4. Lowe, G.: Some new attacks upon security protocols. In: Proceedings of Computer Security Foundations Workshop VIII. IEEE Computer Society Press, Los Alamitos (1996)

    Google Scholar 

  5. Denning, D., Sacco, G.: Timestamps in key distributed protocols. Communication of the ACM 24(8), 533–535 (1981)

    Article  Google Scholar 

  6. Aura, T.: Strategies against replay attacks. In: Proceedings of the 10th IEEE Computer Society Foundations Workshop, Rockport, MA, pp. 59–68 (June 1997)

    Google Scholar 

  7. Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Transactions Fundamentals 90(1), 299–302 (2007)

    Article  Google Scholar 

  8. Hwang, T., Lee, N.Y., Li, C.M., Ko, M.Y., Chen, Y.H.: Two attacks on Neumann-Stubblebine authentication protocols. Information Processing Letters 53, 103–107 (1995)

    Article  MATH  Google Scholar 

  9. Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols, pp. 255–268. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  10. Anderson, R., Needham, R.: Programming Satan’s Computer. In: van Leeuwen, J. (ed.) Computer Science Today. LNCS, vol. 1000, pp. 426–440. Springer, Heidelberg (1995)

    Google Scholar 

  11. Lowe, G.: A family of attacks upon authentication protocols. Technical Report 1997/5, Dept. Mathematics & Computer Science, University of Leicester (1997)

    Google Scholar 

  12. Basin, D., Mdersheim, S., Vigan, L.: OFMC: A symbolic model checker for security protocols. Int. Journal of Information Security 4(3), 181–208 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Costin Badica Giuseppe Mangioni Vincenza Carchiolo Dumitru Dan Burdescu

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dojen, R., Jurcut, A., Coffey, T., Gyorodi, C. (2008). On Establishing and Fixing a Parallel Session Attack in a Security Protocol. In: Badica, C., Mangioni, G., Carchiolo, V., Burdescu, D.D. (eds) Intelligent Distributed Computing, Systems and Applications. Studies in Computational Intelligence, vol 162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85257-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85257-5_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85256-8

  • Online ISBN: 978-3-540-85257-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics