Analysis of security protocols with certificate over open networks: Electronic payment system

Hyun Seok Kim, Il Gon Kim, Jin Young Choi

Research output: Contribution to conferencePaperpeer-review

2 Citations (Scopus)

Abstract

Electronic Commerce and Internet in wireless networks are profoundly changing the way of payment, but there is still little confidence among users concerning the security of their data. The application of formal techniques to the modelling and design of electronic commerce protocols should help to improve their reliability and so enhance the choices of these new technologies. In this paper, we show how the Casper, a special-purpose formal methods tool designed for the verification of the security protocols, was used in the analysis of the BCY(Beller, Chang, Yacobi), the Carlsen BCY and the Mu-Varadharajan BCY protocols. We describe the results of our analysis, which uncovered several vulnerabilities in the specification that would have made possible attacks such as man-in-the-middle attack and replay attack. Finally, we propose a new protocol resistant to these attacks and formally verify its correctness.

Original languageEnglish
DOIs
Publication statusPublished - 2005
Event25th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2005 - Columbus, OH, United States
Duration: 2005 Jun 62005 Jun 10

Conference

Conference25th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2005
Country/TerritoryUnited States
CityColumbus, OH
Period05/6/605/6/10

Bibliographical note

Publisher Copyright:
© 2005 IEEE.

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Analysis of security protocols with certificate over open networks: Electronic payment system'. Together they form a unique fingerprint.

Cite this