Rational authentication protocols

The authors use ideas from game theory to transform two families of authentication protocols so that even an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particularly useful in resisting or discouraging a powerful and rational intruder (as present in military applications) who makes many attempts to break a protocol because even the intruder fails, a denial of service attack is still mounted successfully, and in a password-based protocol, the chance of a successful attack increases quite significantly as more and more attempts are launched to guess the password.

Provided by: Oxford University Computing Services (OUCS) Topic: Security Date Added: Feb 2011 Format: PDF

Find By Topic