期刊文献+

认证协议的有向图模型及其安全性分析

A Directed Graph Model of the Authentication Protocols and its Security Analysis
在线阅读 下载PDF
导出
摘要 认证协议的形式化描述及其安全性分析是安全协议形式化分析的关键问题之一.为了解决以往分析方法中协议规范形式化描述存在的问题,提出了一种协议规范有向图描述方法,并在此基础上提出了协议消息构造的逆向搜索算法.用该算法分析Woo-Lam认证协议,找到了该协议一种新的攻击方法及其攻击路径. The formal description of authentication protocol and its security analysis are one of the most important issues in the protocol analysis. In order to solve the problems in the formal description of cryptographic protocol, a method based on directed graph is presented to formally depict the authentication protocol specification. Meanwhile, a converse-searching algorithm based on directed graph is also presented to construct the protocol messages. Woo-Lam Authenticate protocol is analyzed with this method, and a new flow and its attacking trace are founded.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第4期622-626,共5页 Journal of Chinese Computer Systems
基金 国家“八六三”基金项目(863-104-03-01)资助
关键词 认证协议 协议形式化分析 有向图 authentication protocol formal protocol analysis directed graph
作者简介 谢鸿波,男,1973年生,博士研究生,主要研究方向为网络与信息系统安全、分布对象技术;E—mail:china_xie2002@163.com 吴远成,男,1973年生,博士研究生,主要研究方向为网络与信息系统安全、分布对象技术; 周明天,男,1939年生,教授,博士生导师,主要研究方向为计算机网络、分布对象技术、并行分布处理和网络与信息系统安全。
  • 相关文献

参考文献6

  • 1F Javier Thayer Fabrega, Jonathan C Herzog, Joshua D Guttman. Strand spaces t proving security protocols correct [J]. Journal of Computer Security, 1999, 7:191-320.
  • 2Burrows M, Abadi M, Needham R. A logic of authentication [J]. ACM Transactions on Computer Systems, 1990,8(1):18- 36.
  • 3Catherine Meadows. Formal methods for cryptographic protocol analysis: emerging issues and trends[J]. IEEE Journal on Selected Areas in Communication, 2003,21 (1):44-54.
  • 4Lowe G. Breaking and fixing the needham-schroeder public-key protocol using FDR[J]. Software-Concepts and Tools, 1996, 17:93-102.
  • 5Mao W. An augmentation of BAN-like logics [C]. 8th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 1995, 44-55.
  • 6Woo T Y C, Lam S S. Authentication for distributed systems, from computer [A]. In William Stallings,Practical Cryptography for Data Internetworks[C], IEEE Computer Society Press, January 1992.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部