期刊文献+

安全协议的形式化分析方法研究 被引量:3

A STUDY OF ANALYZING SECURITY PROTOCOLS FORMALLY
在线阅读 下载PDF
导出
摘要 安全协议在网络信息安全中扮演着重要角色,但保证安全协议的正确是一个很困难的问题。现在,许多形式化方法都被用来分析安全协议,本文中我们研究各种方法的基本思想、它的优缺点、发展趋势以及方法之间的关系。最后,说明安全协议形式化分析的困难所在。 Security protocols play an important role in the network information security,but it is very difficult to guarantee their correctness. Now, many formal methods have been used to analyze security protocols, and in this paper, we study the basic idea behind each method, and their advantages and disadvantages, theff trends as well as the relations among these methods. At last, we explain the difficulty of analyzing security protocols formally.
出处 《计算机应用与软件》 CSCD 北大核心 2003年第5期48-50,71,共4页 Computer Applications and Software
  • 相关文献

参考文献16

  • 1Lowe G., An attack on the Needham - Schroeder public - key authentication protocol. In Information Processing Letters, Vol..56, pp. 131-133,1995.
  • 2Burrows M., Abadi M. and Nvedham R., A logic of authentication, ACM Transactiorm on Computer Systems, 1990.
  • 3Nessett D. M., A critique of the Burrows, Abadi, and Needham logic, Operating Systems Review, Vol.24, No.2,pp.35-38,1990.
  • 4Gong L., Needham R., Yahalom R., Reasoning alxmt Belief in Cryptographic Protocols, Proceedings of the 1990 IEEE S~ium on Security andPrivacy,pp.234 -248. IEEE Computer Society Press, 1990.
  • 5Kindred D. ,Theory Generation for Security Protocols. PhD thesis, Camegie Mellon University, 1999.
  • 6lowe G., Breaking and Fixing the Needham-Schroeder Public - Key Protocol Using FDR,In Proceedings d Tools and Algorithms for the Construetion and Analysis of Systems.LNCS 1055.pp.147-166.1996.
  • 7Mitchell J. C., Mitchell M. and Stem U., Automated analysis of cryptographic protocols using Mur), Proceedings of the 1997 IEEE Symposium on Security and Privacy,pp. 141-151,1997.
  • 8Clarke E.M. ,Jim S. ,and Marrero W., Using state space exploration and a natural deduction style message derivation engine to verify security protocels. In Proc. IFIP Working Conference on Programming Concepts Methods(PROCOMET), 1998.
  • 9Paulson L., The inductive approach to verifying cryptographic protocols.Journal of Computer Security, Vo1.6, No. 1, pp. 85-128,1998.
  • 10Fabrega F., Herzog J. ,Guttman J. ,Strand Spaces:Why is a security protocol correct? In Proceedings of the 1998 IEEE Syntmsium on Securityand Privacy, 1998.

同被引文献24

  • 1吴立军,苏开乐.安全协议认证的形式化方法研究[J].计算机工程与应用,2004,40(17):152-155. 被引量:5
  • 2刘政,赵保华,屈玉贵.一种描述安全协议的形式化规范语言[J].小型微型计算机系统,2004,25(7):1246-1249. 被引量:2
  • 3刘霞,陈勇.安全协议的形式化方法概述[J].计算机与数字工程,2005,33(5):39-43. 被引量:2
  • 4付宇,马自堂,王惠芳.安全协议形式化混合分析技术的研究与应用[J].计算机工程,2006,32(17):222-224. 被引量:2
  • 5[1]DolevD,YaoA.On the Security of PublicKey Protocols IEEE Transactions on Information Theory,1983,29(2):198-208.
  • 6[2]JonathanKMillen,SidneyCClark,SherylBFreedam.TheInterrogator:Protocol Security Analysis[J].1987,13(2):274-288.
  • 7Buttyan L, Vajda I. Towards provable security for Ad hoc rou- ting protocols[C]//Proc of SASN' 04. Washington IX;, USA, 2004:94-105.
  • 8Burrows M, Abadi M, Needham R. A logic of authentication[C]. ACM Transactions in Computer Systems, 1990,8 ( 1 ) : 18-36.
  • 9Wang Ying long, Wang Ji-zhi. The Security Analysis for Ad hoc Routing Protocols Based on Improved Strand Space [C]// SP- CA06: 1st International Symposium on Pervasive Computing and Applications. 2006 (1) : 585-588.
  • 10Fdbrega F J T, Herzog J C, Guttman J D. Strand spaces: Why is a security protocol correct? [C]// Proc. of the 1998 IEEE Syrup. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998:160-171.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部