期刊文献+

基于Spin的安全协议形式化验证技术 被引量:4

Formal verification technologis of security protocol based on Spin
下载PDF
导出
摘要 针对安全协议的形式化验证问题,运用模型检测方法,以一种改进的入侵者Promela语义模型,对双方密钥分配中心协议进行Spin模型检测,验证发现其不满足线性时序逻辑(LTL)公式描述的安全性,得到了原协议的安全漏洞。针对该漏洞,提出了一种协议改进方案,并针对改进后的协议,给出新的Promela语义模型的建模方法。改进的入侵者模型建模方法比起原方法:模型检测过程中的存储状态数减少,使模型复杂度降低约40%;迁移状态数减少,使验证效率提升约44%。 Aiming at the formal verification problem in security protocols, an improved Promela semantic intruder model was used to complete the model checking for key distribution center protocol, to find that it does't meet the security property described by LTL( Linear Temporal Logic) formula, and to get a protocol vulnerability. An improvement program against vulnerability was proposed. A new Promela semantic modeling was put forward for the improved protocol. The improved intruder modeling method reduces the number of states stored in the model checking, thus the model complexity reduces about40%; and reduces the number of transiations, thus the verification efficiency increases about 44%.
出处 《计算机应用》 CSCD 北大核心 2014年第A02期85-90,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(11371003) 广西自然科学基金资助项目(2011GXNSFA018154 2012GXNSFGA060003) 广西区主席科技资金资助项目(10169-1) 广西教育厅科研资助项目(201012MS274)
关键词 安全协议 形式化验证 Spin模型检测 Promela语义模型 LTL公式 密钥分配中心协议 security protocol formal verification Spin model checking Promela semantic model Linear Timing Logic(LTL) formula key contribution center protocol
  • 相关文献

参考文献18

  • 1范红,冯登国编著..安全协议理论与方法[M].北京:科学出版社,2003:421.
  • 2卿斯汉编著..安全协议[M].北京:清华大学出版社,2005:362.
  • 3NEEDHAM R, SCHROEDER M. Using encryption for authentica- tion in large networks of computers[ J]. Communications of the ACM, 1978, 21(12) : 993 -999. 被引量:1
  • 4LOWE G. An attack on the Needham-Schroeder public-key authen- tication protocol [J]. Information Processing Letters, 1995, 56:131 -133. 被引量:1
  • 5BURROWS M, ABADI M, NEEDHAM R M. A logic of authentica- tion[ J].Proceedings of the Royal Society of London. A. Mathemati- cal and Physical Sciences, 1989, 426( 1871): 233 -271. 被引量:1
  • 6GONG L, NEEDHAM R, YAHALOM R. Reasoning about belief in eryptographie protocols[ C]// Proceedings of the 1990 IEEE Com- puter Society Symposium on Research in Security and Privacy. Pis- caraway: IEEE, 1990:234-248. 被引量:1
  • 7MAO W, BOYD C. Towards formal analysis of security protocols [ C]// Proceedings of the 1993 IEEE Computer Security Founda- tions Workshop VI. Piscataway: IEEE, 1993: 147- 158. 被引量:1
  • 8ABADI M, TUTYLE M R. A semantics for a logic of authentication [ C]//Proceedings of the Tenth Annum ACM Symposium on Princi- ples of Distributed Computing. New York: ACM, 1991:201 -216. 被引量:1
  • 9van OORSCHOT P. Extending cryptographic logics of belief to key agreement protocols[ C]// Proceedings of the 1st ACM Conference on Computer and Communications Security. New York: ACM, 1993:232-243. 被引量:1
  • 10SYVERSON P F, van OORSCHOT P C. On unifying some erypto- graphic protocol logics[ C]// Proceedings of the 1994 IEEE Com- puter Society Symposium on Research in Security and Privacy. Pis- cataway: IEEE, 1994: 14-28. 被引量:1

同被引文献30

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部