Security

Rational authentication protocols

Download Now Free registration required

Executive Summary

The authors use ideas from game theory to transform two families of authentication protocols so that even an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particularly useful in resisting or discouraging a powerful and rational intruder (as present in military applications) who makes many attempts to break a protocol because even the intruder fails, a denial of service attack is still mounted successfully, and in a password-based protocol, the chance of a successful attack increases quite significantly as more and more attempts are launched to guess the password.

  • Format: PDF
  • Size: 94.8 KB