期刊文献+

认证协议攻击与非形式化分析 被引量:6

Informal Methods for the Analysis of Authentication Protocols
在线阅读 下载PDF
导出
摘要 协议的分析验证方法有形式化与非形式化之分 ,很多代表性的协议虽然存在着缺陷 ,但对这些协议的非形式化分析 ,却可以提出一些值得借鉴的规则 ,参考这些规则可以避免和减少协议逻辑的漏洞 ,本文针对 Woo- L am两个改进协议以及 SSL协议给出了攻击方法 。 The methods of analyzing and verifying cryptographic protocols can be categorized into formal and informal ones. Although there are flaws in some typical protocols, we can draw a few helpful principles by informally analyzing them. Based upon those principles, cryptographic protocols are less prone to designed errors. In this paper, some new attacks upon three authentication protocols are presented. Then the reasons resulting these attacks are analyzed, and some proposals to improve the related authentication protocols are given.
出处 《小型微型计算机系统》 CSCD 北大核心 2003年第11期1912-1915,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目 ( 60 172 0 17)资助
关键词 认证协议 协议攻击 密码协议 密码学 非形式化方法 authentication protocol protocol attack cryptographic protocol cryptography informal method
  • 相关文献

参考文献9

  • 1Burrows M, Abadi M, Needham R. A logic of authentication[C]. Proceeding of the Royal Society of London, 1980, A : 233-271.
  • 2Gong L.Needham R and Yahalom R.Reasoning about belief in cryptographic protocols [C].In:Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy.May 1990.234~48.
  • 3Boyd C, Mao W. On a limitation of BAN logic[A]. In:Helleseth T, ed. Advances in Cryptology-EUROCRYPT' 93. Lecture Notes in Computer Science 765 [C]. Berlin: Springer-Verlag. 1993, 240-247.
  • 4Nessett D M. A critique of the Burrows, abadi and needham logic [J]. Operating Systems Review, 1990,24(2) :35-38.
  • 5Mitchell J, Mitchell M, Stern U. Automated analysis of cryptographic protocols using Mur[C]. In: Proc of the 1997 IEEE Symp on Security and Privacy, Hiroshima, Japan: IEEE Computer Society Press, 1997, 141-151.
  • 6Debbabi M. Mejri M. Tawbi Net al. Formal automatic verification of authentication cryptographic protocols CC3. In: Proc of the 1st IEEE. Int;l Conf on Formal Engineering Methods. Oakland. CA. 1997.50-59.
  • 7Woo T Y C, Lam S S. Authentication for distributed systems[J]. Computers. 1992,25(1): 39-52.
  • 8Abadi M, Needham R. Prudent engineering practice for cryptographic protocols[J]. IEEE Transactions on Software Engineering, 1996. 22(1): 6-15.
  • 9Hickman K E B. The SSL protocolCS3. RFC, Netscape Communications Corp. Version of October 31,1994.

同被引文献98

引证文献6

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部