期刊文献+

公钥密码体制下认证协议的形式化分析方法研究 被引量:4

Research to Formal Analysis Methods for Public-Key Authentication Protocols
在线阅读 下载PDF
导出
摘要 本文通过对形式化方法中最广泛使用的类 BAN逻辑进行研究发现 ,此方法更侧重于对称密码体制下认证协议的分析 ,而在分析基于公钥体制的认证协议时 ,该方法有很大的局限性 .因此 ,文中针对公钥密码的特点对类 BAN逻辑进行了扩展 . Through researching into BAN like logic which is used popularly in formal analysis methods, we found that the logic focused on analyzing authentication protocols which based on symmetric cryptography, it is not fit for public key authentication protocols. In this paper, we design new symbol definitions and inference rules in BAN like logic according to characteristic of public key cryptography, new logic can be used to verify correctness of public key authentication protocols very well.
出处 《小型微型计算机系统》 CSCD 北大核心 2002年第2期145-147,共3页 Journal of Chinese Computer Systems
基金 国家 8 63高科技项目基金 (编号 :863 -3 0 6-ZT0 2 -0 6-3 )资助
关键词 公钥密码体制 认证协议 形式化方法 类BAN逻辑 身份认证 网络安全 计算机网络 public key cryptography authentication protocols formal methods BAN like logic
  • 相关文献

参考文献1

  • 1钱勇 谷大武 等.X.509认证协议的改进及其形式分析[J].软件学报,1999,10:415-418.

同被引文献37

  • 1任侠,吕述望.NS公钥认证协议的另一个改进方法[J].计算机工程,2004,30(16):12-13. 被引量:2
  • 2卓继亮,蔺慧丽,李先贤.具有可信第三方的认证协议的安全性[J].计算机应用研究,2004,21(12):109-112. 被引量:4
  • 3Ian Foster,Yong Zhao.Cloud computing and grid computing 360-degree compared[C].2008 Grid Computing Environments Workshop,IEEE,Austin,Texas,12-16,2008,1-10.
  • 4Rajkumar Buyya,Chee Shin Yeo,Srikumar Venugopal.Market-oriented cloud computing:vision,hype,and reality for delivering IT services as computing utilities[C].Proc.of 10th IEEE Conference on HPCC'08,IEEE,Dalian,China,25-27 Sept.2008,5-13.
  • 5OASIS Standard.Web services security:SOAP message security1.1(WS-Security 2004)[EB/OL].http://does.oasis-open.org/wss/v1.1/.1 February 2006.
  • 6Wang Lv.Security model and specifications for web services[C].China Education INFO,2004,10,24-26.
  • 7OASIS Standard.Assertions and protocols for the OASIS security assertion markup language(SAML)V2.0[EB/OL].http://docs.oasis-open.org/security/saml/v2.0/,2005-03.
  • 8W3C Recommendation.XML key management specification(XKMS2.0)[EB/OL].http://www.w3.org/TR/2002/RECxmlenc-core-20021210/,2002-12-10.
  • 9Jaehong Park,Ravi Sandhu.Towards usage control models:beyond traditional access control[C].SACMAT02,June 3-4,2002,Monterey,California,USA,ACM.
  • 10Henry Bequet.Wei Hai-ping,Yu xiao-fei,et al.Java SOAP programming[M].Beijing:Publishing House of Electronics Industry,2002.

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部