期刊文献+

基于串空间和状态转换的认证协议分析方法 被引量:3

Analysis of Authentication Protocols Based on Strand Space and State Transition
下载PDF
导出
摘要 串空间是一种新兴的安全协议形式化分析模型。串空间模型中的理论证明方法虽然严谨,但难度很大。本文基于串空间模型,首先定义系统状态,并以Needham-Schroeder-Lowe公钥认证协议为例说明系统状态转换的分析过程。通过对状态转换过程中现实的跟踪考察,得出了有意义的结论。结合串空间模型,验证了该认证协议的安全性。这种分析认证协议的新方法简洁和高效,并易于实现自动化。 Strand space is a new formal model for the analysis of security protocols. Precise though they are, theory testifies in the strand space model are difficult. Firstly, based on the strand space model, the state of system is defined. Secondly, analysis process of transitions between system states is explained by the example of Needham-Schroeder-Lowe public key authentication protocol. Investigating nonces in transitions between system states, we draw some significant conclusions. Finally, the security of Needham- Schroeder-Lowe protocol is validated. This new method for analyzing authentication protocols is simple and efficient, and it is prone to be automated.
出处 《计算机科学》 CSCD 北大核心 2007年第10期96-98,共3页 Computer Science
基金 本课题得到解放军信息工程大学重点研究方向基金资助。
关键词 串空间 认证协议 状态转换 现实 Strand space, Authentication protocol, State transition, Nonce
  • 相关文献

参考文献12

  • 1Lowe G. An attack on the needham-schroeder public key authentication protocol[J]. Information Processing Letters, 1995, 56 (3) :131-136 被引量:1
  • 2Thayer F, Herzog J C, Guttman J D. Strand space: why is a security protocol correct[C]. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1998(5) : 160-171 被引量:1
  • 3Thayer F, Herzog J C, Guttman J D. Strand spaces: proving security protocols Correct[J]. Journal of Computer Security, 1999, 7(2): 191-230 被引量:1
  • 4刘东喜,李小勇,等.An Attack—Finding Algorithm for Security Protocols[J].Journal of Computer Science & Technology,2002,17(4):450-463. 被引量:4
  • 5Guttman J D. Security protocol design via authentication tests [C]. In: Proceedings 15^th IEEE Computer Security Foundations Workshop(CSFW-15), IEEE Computer Society Press, 2002.92 -103 被引量:1
  • 6Burrows M, Abadi M, Needham R. A logic of authentication[J]. ACM Transactions on Computer System, 1990, 8(1) : 18-36 被引量:1
  • 7Thayer F, Herzog J C, Guttman J D. Strand space picture[C].In: the LICS Workshop on Formal Methods and Security Protocols, 1998 被引量:1
  • 8Paulson L C. The inductive approach to verifying cryptographic protocols[J].Journal of Computer Security, 1998,6(1):85-128 被引量:1
  • 9Lowe G. A hierarchy of authentication specifications[C]. In: 10th Computer Seeutity Foundations Workshop Proceedings, IEEE Computer Society Press, .1997.31-43 被引量:1
  • 10Lowe G. Breaking and fixing the needham-schroeder public-key protocol using FDR[C]. In: Proceedings of TACAS, Springer Verlag, 1996. 147-166 被引量:1

二级参考文献20

  • 1Lowe G. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters,1995, 56(3): 131-136. 被引量:1
  • 2Gritzalis S, Spinellis D, Georgiadis P. Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification. Computer Communications, 1999, 22(8): 695-707. 被引量:1
  • 3Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990, 8(1): 18-36. 被引量:1
  • 4Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE 1990 Symp. on Security and Privacy, Oakland, California, May, 1990, pp.234-248. 被引量:1
  • 5Kindred D. Theory generation for security protocols [Dissertation]. Carnegie Mellon University, 1999. 被引量:1
  • 6Brackin S. Automatically detecting most vulnerabilities in cryptographic protocols. In the DARPA Information Survivability Conference and Exposition, 2000, 1: 222-236. 被引量:1
  • 7Mitchell J C, Mitchell M, Stern U. Automated analysis of cryptographic protocols using Murφ. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1997, pp.141-151. 被引量:1
  • 8Clarke E M, Jha S, Marrero W. Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In Proceedings of the IFIP Working Conference on Programming Concepts and Methods, New York, 1998. 被引量:1
  • 9Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, Lecture Notes in Computer Science 1055, Springer-Verlag, 1996, pp.147-166. 被引量:1
  • 10Song D. Athena: A new efficient automated checker for security protocol analysis. In Proceedings of 12th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, June, 1999, pp.192-202. 被引量:1

共引文献3

同被引文献27

  • 1李莉,薛锐,张焕国,冯登国,王丽娜.基于口令认证的密钥交换协议的安全性分析[J].电子学报,2005,33(1):166-170. 被引量:15
  • 2李谢华,李建华,杨树堂,诸鸿文.认证测试方法在安全协议分析中的应用[J].计算机工程,2006,32(2):19-22. 被引量:2
  • 3刘璟,祝世雄,周明天.Yahalom协议的串空间模型及分析[J].小型微型计算机系统,2006,27(5):788-792. 被引量:5
  • 4王鹏,李谢华,陆松年.基于认证测试方法的EAP-AKA协议分析[J].计算机工程与应用,2007,43(15):157-159. 被引量:9
  • 5BELLOVIN S M, MERRITT M. Encrypted Key Exchange:Password Based Protocols Secure Against Dictionary Attacks [ A].Proceedings of i992 IEEE: Crnputer Society Symposium on Research in Security and Privacy [ C]. Oakland : IEEE Computer 被引量:1
  • 6LI Gong, LOMAS T M,ROGER M, etal, Protecting Poorly Chosen Secrets from Guessing Attacks [ J ]. IEEE Journal on Selected Areas in Commuaications,1995,11(5):648-656. 被引量:1
  • 7GOLDREICH O, LINDELL Y.Session Key Generation Using Human passwords Only [A]. KILIAN J. Proceedings of the Advances in Cryproiogy [ C]. Heidelberg: Springer-verlag, 2001:408-432. 被引量:1
  • 8WU T.A Real World Analysis of Kerberos password Security[EB/OL].http://www.isoc,org/isoc/conferences/ndss/99/proceedings/papers/wu.pdf.2007-05-07. 被引量:1
  • 9HALEVI S, KRAWCZYK H. Public-key Cryptography and Password Protocols [J ]. ACM Transaction on Information and System Security,1999,2(3):230-268. 被引量:1
  • 10BOYKO V, MACKENZIE P, PATEL S. Provabty Secure password Authenticated Key Exchange Using Diffie-hellman [ A].Proceedings of Advances in Cryptology-Eurocrypt 2000 [ C].Heideiberg: Springer-verlag, 2000 : 156-171. 被引量:1

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部