The classification of e-authentication protocols for targeted applicability
Chia, Wan Yin.
Fulp, J. D.
MetadataShow full item record
Authentication is a fundamental aspect of information security in enabling the authenticity of the source of information to be determined. Among several electronic authentication mechanisms available today, deploying the right authentication mechanism will protect information against its envisaged threat(s) in the designated operating environment. This study attempts to create a taxonomy (classification) for current operational authentication protocols, and show how the taxonomy could help to determine the appropriate protocol to meet a particular operating environment's authentication needs. The approach used in this study's taxonomy development was to perform functional decomposition of the protocol in terms of the functionality it provides, the mechanisms it utilizes, and the key elements in facilitating its operation. This enabled a breaking-down into the fundamental building blocks of what makes up the protocol. The development of the taxonomy in this way enabled different perspectives and analyses of the protocols' capabilities and their applicability. The basic idea of authentication via proof of possession of a secret, whether it is symmetric or asymmetric, applies for all categories of authentication protocols under study. Several use cases are put forth illustrating how the classification can be leveraged to facilitate analysis of the applicability of the protocol for implementation in a given targeted environment.
Showing items related by title, author, creator and subject.
Kiat, Koh Ho; Run, Lee Yong (Monterey, California. Naval Postgraduate School, 2012-09);There is an increasing use of contactless smart card technology for identification, access control, and financial transactions due to its numerous advantages. However, there is also an increasing number of attacks that ...
Rogers, Jason Lee (Monterey, California. Naval Postgraduate School, 2004-12);Cryptographic protocols provide security services through the application of cryptography. When designing a cryptographic protocol, the requirements are, often, specified informally. Informal specification can lead to ...
Zhang, Xian; Liu, Yang; Auguston, Mikhail (IEEE, 2010);Security protocols are hard to design, even under the assumption of perfect cryptography. This is especially true when a protocol involves different timing aspects such as timestamps, timeout, delays and a set of timing ...