期刊文献+

密码协议的一种安全模型(英文)

A Security Model for Cryptographic Protocols
在线阅读 下载PDF
导出
摘要 将密码协议与密码算法视为一个系统,建立了密码协议系统的一种安全模型.基于假设/保证的组合推理技术提出了新的假设/保证推理规则和假设/保证推理算法,证明了该规则的完备性,实现了密码协议系统的模型检查,并重点解决了系统分解问题、假设函数的设定问题、进程+逻辑的系统特性描述问题等难题.以kerberos密码协议系统为例,利用该安全模型和假设/保证推理技术对密码协议系统进行了安全验证. In this paper, a cryptographic protocol together with its cryptographic algorithms is regarded as one system, and a security model for the system is built. Based on assume-guarantee compositional reasoning techniques, a new assume-guarantee based reasoning rule and algorithm are proposed, and the soundness of the rule is proved. In realizing model checking to the cryptographic protocol system, several difficulties are solved chiefly such as decomposition of the system, generation of assumed functions, and specifying security properties in forms of both logic formulas and processes. Using this security model and assume-guarantee based reasoning techniques, the kerberos cryptographic protocol system is verified.
出处 《软件学报》 EI CSCD 北大核心 2003年第6期1148-1156,共9页 Journal of Software
基金 国家重点基础研究发展规划(973)~~
关键词 协议验证 安全模型 模型检查 组合推理 protocol verification security model model checking compositional reasoning
  • 相关文献

参考文献1

二级参考文献6

  • 1[1]Roscoe A W. Intensional specifications of security protocols[A]. In: Guttman J, ed. Proceedings of 9th IEEE Computer Security Foundations Workshop[C]. Los Alamitos: IEEE Computer Society, 1996. 28~38.
  • 2[2]Boyd C. Towards extensional goals in authentication protocols[J/OL].http://dimacs.rutgers.edu/workshops/security/program2/program.html,1997.
  • 3[3]Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security, 1998, 6(1/2): 85~128.
  • 4[4]Abadi M, Tuttle M R. A semantics for logic of authentication[A]. In: Proceedings of the 10th ACM Symposium on Principles of Distributed Computing[C]. New York: ACM Press, 1991. 201~216.
  • 5[5]Meadows C. A model of computation for the NRL protocol analyzer[A]. In: Gong L, ed. Proceedings of Computer Security Foundations Workshop VII[C].Los Alamitos: IEEE Computer Society Press, 1994. 84~89.
  • 6[6]Syverson P F. Adding time to a logic of authentication[A]. In: Sandhu R, ed. Proceedings of the First ACM Conference on Computer and Communications Security[C]. New York: ACM Press, 1993. 97~101.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部