The classification of e-authentication protocols for targeted applicability

Download
Author
Chia, Wan Yin.
Date
2009-12Advisor
Fulp, J. D.
Huffmire, Ted
Metadata
Show full item recordAbstract
Authentication is a fundamental aspect of information security in enabling the authenticity of the source of information to be determined. Among several electronic authentication mechanisms available today, deploying the right authentication mechanism will protect information against its envisaged threat(s) in the designated operating environment. This study attempts to create a taxonomy (classification) for current operational authentication protocols, and show how the taxonomy could help to determine the appropriate protocol to meet a particular operating environment's authentication needs. The approach used in this study's taxonomy development was to perform functional decomposition of the protocol in terms of the functionality it provides, the mechanisms it utilizes, and the key elements in facilitating its operation. This enabled a breaking-down into the fundamental building blocks of what makes up the protocol. The development of the taxonomy in this way enabled different perspectives and analyses of the protocols' capabilities and their applicability. The basic idea of authentication via proof of possession of a secret, whether it is symmetric or asymmetric, applies for all categories of authentication protocols under study. Several use cases are put forth illustrating how the classification can be leveraged to facilitate analysis of the applicability of the protocol for implementation in a given targeted environment.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Analysis of OPACITY and PLAID Protocols for Contactless Smart Cards
Kiat, Koh Ho; Run, Lee Yong (Monterey, California. Naval Postgraduate School, 2012-09);There is an increasing use of contactless smart card technology for identification, access control, and financial transactions due to its numerous advantages. However, there is also an increasing number of attacks that ... -
Secure distribution of open source information
Rogers, Jason Lee (Monterey, California. Naval Postgraduate School, 2004-12);Cryptographic protocols provide security services through the application of cryptography. When designing a cryptographic protocol, the requirements are, often, specified informally. Informal specification can lead to ... -
Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP
Zhang, Xian; Liu, Yang; Auguston, Mikhail (IEEE, 2010);Security protocols are hard to design, even under the assumption of perfect cryptography. This is especially true when a protocol involves different timing aspects such as timestamps, timeout, delays and a set of timing ...