Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther.
Zeyad MohammadPublished in: Int. J. Commun. Syst. (2020)
Keyphrases
- cryptographic protocols
- formal analysis
- security requirements
- high security
- security analysis
- ban logic
- security model
- statistical databases
- information security
- communication protocols
- security properties
- protocol specification
- security protocols
- security services
- security problems
- access control
- integrity verification
- key agreement protocol
- rfid systems
- java card
- intrusion detection
- security policies
- security level
- security threats
- key distribution
- network security
- formal proof
- electronic voting
- security issues
- rfid tags
- network layer
- denial of service attacks
- lightweight
- security mechanisms
- virtual private network