期刊文献+

基于细粒度新鲜性的密码协议分析

Security Analysis of Cryptographic Protocols Based on Fine-Grained Freshness
下载PDF
导出
摘要 对新鲜性进行了细粒度的定义,并将新鲜性和秘密性结合,完善了基于新鲜性原则的密码协议分析方法。区分了不同主体产生的新鲜性标识符的可信任新鲜性,并对私有秘密和共享秘密给予了更准确的解释。改进后的基于新鲜性原则的密码协议分析方法能够分析并发现Helsinki协议中存在的微妙的安全缺陷。 Fine-grained definitions of freshness are presented,and both freshness and secrecy are combined to improve the security analysis of cryptographic protocols.Trusted freshness of the nonces generated by different principals are explicitly distinguished.More exact explanations on the private secrecy and shared secrecy are given.The improved method can analyze and find out some existing subtle weaknesses in the Helsinki protocol.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第5期763-770,共8页 Acta Scientiarum Naturalium Universitatis Pekinensis
基金 国家自然科学基金(60973111 60903189) 国家高技术研究发展计划专项经费(2009AA01Z418) 国家重点基础研究发展计划项目(2007CB311201)资助
关键词 密码协议 新鲜性 秘密性 cryptographic protocol freshness secrecy
  • 相关文献

参考文献10

  • 1Needham R M, Schroeder M D. Using encryption for authentication in large network of computers. Communication of the ACM, 1978, 21(12) : 993-999. 被引量:1
  • 2Lowe G. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 1995, 56(3): 131-133. 被引量:1
  • 3Dolev D, Yao A C. On the security of public key protocols. IEEE Transactions on Information Theory, 1983, 29(2) : 198-208. 被引量:1
  • 4Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990, 8(1) : 18-36. 被引量:1
  • 5Gong L, Needham R, Yahalom R. Reasoning about belief in crypto-graphic protocols. Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, 1990:234-248. 被引量:1
  • 6Syverson P, Van Oorschot P. On unifying some cryptographic protocol logics. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, 1994 : 14-28. 被引量:1
  • 7董玲,陈克非,来学嘉.密码协议分析的信任多集方法[J].软件学报,2009,20(11):3060-3076. 被引量:5
  • 8ISO. ISO/IEC 2nd DIS 11770-3: key management- Part 3: mechanisms using asymmetric techniques. Geneva : International Organization for Standardization, 1997. 被引量:1
  • 9Mitchell C J, Yeun C Y. Fixing a problem in the Helsinki protocol. ACM Operating Systems Review, 1998, 32(4): 21-24. 被引量:1
  • 10Burrows M, Abadi M, Needham R M. A logic of authentication [ R/OL ]. ( 1989- 02 ) [ 2010- 01- 08 ]. http: //www. hpl. hp. eom/techreports/compaq-DEC/ SRC-RR-39. pdf. 被引量:1

二级参考文献10

  • 1Lowe G.An attack on the needham-schroeder public key authentication protocol[].Information Processing Letters.1995 被引量:1
  • 2Lowe G.Towards a completeness result for model checking of security protocols[].Journal of Computer Security.1999 被引量:1
  • 3Denning D,Sacco G.Timestamps in key distribution protocols[].Communications of the ACM.1978 被引量:1
  • 4.Wireless LAN medium access control (MAC)and physical layer (PHY)specifications:medium access control (MAC)security enhancements[].IEEE Stdi.2004 被引量:1
  • 5Abadi M,Needham R.Prudent engineering practice for cryptographic protocols[].IEEE Transactions on Software Engineering.1996 被引量:1
  • 6Needham R,Schroeder M.Using encryption for authentication in large networks of computers[].Communications of the ACM.1978 被引量:1
  • 7Burrows M,Abadi M,Needham R M.A Logic of Cryptographic[].ACM Transactions on Computer Systems.1990 被引量:1
  • 8Goldwasser S,Micali S.Probabilistic Encryption[].Journal of Computer and System Sciences.1984 被引量:1
  • 9Bellare M,Rogaway P.Random oracles are practical: a paradigm for designing efficient protocols[].Proceedings of first ACM conference on Computer and Communications Security.1993 被引量:1
  • 10Lowe G.Breaking and Fixing the Needham-Schroeder Public-key Protocol Using FDR[].Proceedings of the nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems.1996 被引量:1

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部