期刊文献+

一种自动密码协议分析方法

Automatic cryptographic protocol analysis
在线阅读 下载PDF
导出
摘要 密码协议是构建网络安全环境、保护信息系统安全的重要手段之一,然而分析其固有缺陷和揭示入侵攻击行为,却是一件非常困难的事情。文中通过综合基于逻辑和模型检测的密码协议分析方法,提出了一种基于目标提取和消息模式匹配的自动密码协议分析方法,并以Needham-Schroeder(NS)公钥协议为例,进行了具体分析。 Cryptographic protocol is one of the important ways of constructing safe internet environment and protecting the safety of information systems. However, it is very difficult to analyze its limitation and unclose the intrusion. In this article, an automatic cryptographic protocol analysis was put forward, based on object submission and information model inspection by synthesizing the cryptographic protocol analysis based on logic and model matching, and further analysis on public-key protocol of Need-Schroeder(NS) was made.
出处 《计算机应用》 CSCD 北大核心 2005年第9期2089-2091,共3页 journal of Computer Applications
基金 安徽省教育厅重点科研项目(2003KJ049ZD)
关键词 密码协议 协议分析 模型检测 cryptographic protocol protocol analysis model inspection
  • 相关文献

参考文献9

  • 1PAULSON CP. Proving properties of security protocols by induction [A]. Proceedings of the IEEE Computer Security Foundations Workshop X, 1997.70 - 83.
  • 2DECKER BD , PIESSENS F . CryptoLog: A Theorem Prover for Cryptographic Protocols [M]. DIMACS Workshop on Design and Formal Verification of Security protocols, 1997.
  • 3BURROWS M, ABADI M, NEEDHAM R. A logic of Authentication [A]. ACM Transactions in Computer Systems[C], 1990.
  • 4ABADI M, TUTLE MR. A Semantics for a Logic of Authentication [A]. Proceedings of the 10th Annual ACM Symposium On Principles of Distributed Computing[C]. ACM Press, 1991.
  • 5MAO W, BOYD C. Towards the Formal Analysis of Security Protocols[C]. Proceedings of the 1993 IEEE Computer Security Foundations Workshop VI[C], 1993. 147 - 158.
  • 6STALLINGSW 杨明 胥光辉 齐望东 译.密码编码学与网络安全:原理与实践[M]:第2版[M].北京:电子工业出版社,2001..
  • 7MILLEN J, SHMATIKOV V. Symbolic protocol analysis with products and Diffie-Hellman exponentiation[A]. 16th IEEE Computer Security Foundations Workshop[C]. IEEE Computer Society. 2003.47 -61.
  • 8MEADOWS C. Formal Methods for Cryptographic Protocol Analysis:Emerging Issues and Trends[ EB/OL]. http:∥chacs. nrl. navy. mil/publications/CHACS/2003/2003meadows - issues. pdf, 2003.
  • 9STEPHEN H. Brackin. Implementing Effective Automatic Cryptographic Protocol Analysis[A]. 14th IEEE International Conference [C], 1999.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部