An Active Attack on Token-Based Security Protocol

    Research output: Contribution to journalArticlepeer-review

    Abstract

    In this paper, we analyzed the token-based security protocol [1] using the GNY logic to determine the security flaws of the protocol. We found out that the token-based protocol has two security flaws. The first one leads to an active attack which enables the intruder to get sensitive information whereas the second may result in gumming up the network and thus reducing the efficiency of its operation. Therefore, this protocol can not be approved for authentication. We conclude our paper by proposing a modification to the token-based protocol that overcomes these attacks.
    Original languageEnglish
    Pages (from-to)365-374
    Number of pages10
    JournalJournal of Engineering and Applied Science, Cairo University
    Volume48
    Issue number2
    Publication statusPublished - Apr 2001

    Fingerprint

    Dive into the research topics of 'An Active Attack on Token-Based Security Protocol'. Together they form a unique fingerprint.

    Cite this