Towards a secure human-and-computer mutual authentication protocol
Contribuinte(s) |
Pieprzyk, Josef Thomborson, Clark |
---|---|
Data(s) |
2012
|
Resumo |
We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives. |
Formato |
application/pdf |
Identificador | |
Publicador |
Australian Computer Society Inc |
Relação |
http://eprints.qut.edu.au/57928/1/CRPITV125Radke.pdf http://crpit.com/confpapers/CRPITV125Radke.pdf Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2012) Towards a secure human-and-computer mutual authentication protocol. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc, Melbourne, Vic., pp. 39-46. |
Direitos |
Copyright 2012 The Australian Computer Society Inc The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included. |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Palavras-Chave | #Ceremony #Human #HTTPS #TLS #Security #Privacy #Provable security #Authentication |
Tipo |
Conference Paper |