Ceremony analysis : strengths and weaknesses


Autoria(s): Radke, Kenneth; Boyd, Colin; Gonzalez Nieto, Juan M.; Brereton, Margot
Data(s)

01/06/2011

Resumo

We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better understand the issues involved.We analyse three ceremonies, HTTPS, EMV and Opera Mini, and use the information gained from the experience to establish a list of typical flaws in ceremonies. Finally, we use that list to analyse a protocol proven secure for human use. This leads to a realisation of the strengths and weaknesses of ceremony analysis.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/42327/

Publicador

Springer

Relação

http://eprints.qut.edu.au/42327/1/42327S.pdf

DOI:10.1007/978-3-642-21424-0_9

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.

Direitos

Copyright 2011 IFIP International Federation for Information Processing

Fonte

Faculty of Built Environment and Engineering; Information Security Institute

Palavras-Chave #080303 Computer System Security #080402 Data Encryption #Ceremony #Security #Privacy #Provable Security #Humans #EMV #HTTPS #Opera Mini
Tipo

Conference Paper