期刊文献+

安全协议关联性分析 被引量:5

Analysis of correspondence property for security protocols
下载PDF
导出
摘要 提出安全协议本质上是协议主体利用密码学手段通过挑战-响应来对协议另一方的存在做出判断,并同时完成对一些数据例如会话密钥等的协商。依据这种思想,结合认证逻辑中的一些成果,提出了一种新的安全协议关联性的分析方法,该方法对协议认证目标进行了基于线空间模型语义的定义,并将关联性分析归结为Strand的存在关系和Strand参数一致性的分析问题。 Cryptographic protocol was specified as the procedure of challenge and response using cryptography, not only to confirm the existence of other principals but also to negotiate about some data such as session keys. Applying the idea and some authentication logic results, a new efficient method that provided SSM semantics-based definition of authentication goal was proposed, which summed up correspondence analysis as the analysis of the existence relationship of strands and the consistence of strand parameters.
作者 杨明 罗军舟
出处 《通信学报》 EI CSCD 北大核心 2006年第7期39-45,52,共8页 Journal on Communications
基金 国家自然科学基金资助项目(90412014)~~
关键词 网络安全 协议分析 挑战-响应 线空间模型 network security protocol analysis challenge-response strand space model
  • 相关文献

参考文献11

  • 1FABREGA F J T,HERZOG J C,GUTTMAN J D.Strand spaces:why is a security protocol correct?[A] Proc of the 1998 IEEE Symp on Security and Privacy[C].Los Alamitos:IEEE Computer Society Press,1998.160-171. 被引量:1
  • 2FABREGA F J T,HERZOG J C,GUTTMAN J D.Strand spaces:proving security protocols correct[J].Journal of Computer Security,1999,7(2/3):191-230. 被引量:1
  • 3SONG D X D.Athena:a new efficient automatic checker for security protocol analysis[A].Proc of the 12th IEEE Computer Security Foundations Workshop[C].Los Alamitos:IEEE Computer Society Press,1999.192-202. 被引量:1
  • 4SONG D X D,BEREZIN S,PERRIG A.Athena:a novel approach to efficient automatic security protocol analysis[J].Journal of Computer Security,2001,9(1):47-74. 被引量:1
  • 5GUTTMAN J D,FABREGA F J T.Authentication tests[A].Proc of the 2000 IEEE Symp on Security and Privacy[C].Los Alamitos:IEEE Computer Society Press,2000.96-109. 被引量:1
  • 6GUTTMAN J D,FABREGA F J T.Authentication tests and the struc ture of bundles[J].Theoretical Computer Science,2002,283(2):333-380. 被引量:1
  • 7GUTTMAN J D.Security protocol design via authentication tests[A].Proc of the 2002 IEEE Computer Security Foundations Workshop[C].Los Alamitos:IEEE Computer Society Press,2002.92-103. 被引量:1
  • 8季庆光,卿斯汉,周永彬,冯登国.Study on Strand Space Model Theory[J].Journal of Computer Science & Technology,2003,18(5):553-570. 被引量:7
  • 9WOO T Y C,LAM S S.A semantic model for authentication protocols[A].Proc of the 1993 IEEE Computer Society Symp on Research in Security and Privacy[C].Los Alamitos:IEEE Computer Society Press,1993.178-194 被引量:1
  • 10LOVE G.A hierarchy of authentication specifications[A].Proc of 10th Computer Security Foundations Workshop[C].1997.31-43. 被引量:1

二级参考文献1

共引文献6

同被引文献37

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部