期刊文献+

TLS协议认证测试模型与形式化分析 被引量:2

Formalized analysis for authentication test model of TLS
在线阅读 下载PDF
导出
摘要 TLS协议是一种重要的传输层安全协议,得到了广泛的应用。在结合串空间理论和方法的基础上,通过构造TLS握手协议的认证测试模型,提出了TLS协议的DH参数签名认证测试方案,分析和证明了协议的保密性和认证性等关键属性。结果表明TLS协议满足其安全性说明。 TLS protocol is an important transport layer security protocol,and is widely used.Based on strand space theory,this paper points out the DH parameter signature certification testing program,analyzes and proves the confidentiality and authentication of the agreement.The result shows that the TLS protocol meets their security statement.
作者 孔娟 曹利培
出处 《计算机工程与应用》 CSCD 北大核心 2009年第23期100-103,共4页 Computer Engineering and Applications
关键词 传输层安全协议 认证测试 串空间 形式化分析 Transport Layer Security(TLS) protocol authentication test strand space formalized analysis
作者简介 孔娟(1966-),女,副教授,研究领域为:多媒体信息处理、网络信息安全 曹利培,讲师,研究领域为:SOA、Web服务、形式化和语义等。
  • 相关文献

参考文献17

二级参考文献59

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:105
  • 2沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16
  • 3Fabrega FJT, Herzog JC, Guttman JD. Strand spaces: Why is a security protocol correct? In: Proc. of the 1998 IEEE Symp, on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998, 160-171, http://ieeexplore.ieee.org/ie14/5528/14832/00674832.pdf? tp=&arnumber=674832&isnumber=14832.
  • 4Fitbrega FJT, Herzog JC, Guttman JD. Strand spaces: Proving security protocols corect. Journal of Computer Security, 1999,7(2-3):191-230.
  • 5Paulson LC. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6(1):85-128.
  • 6Guttman JD, F/ibrcga FJT. Authentication tests. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2000. 96-109. http://ieeexplore.ieee.org/ie15/6864/18435/00848448.pdf?.tp=&arnumber=848448&isnumber=18435.
  • 7Guttman JD, F/ibrega FJT. Authentication tests and the structure of bundles. Theoretical Computer Science, 2002,283(2):333-380.
  • 8Guttman JD. Security protocol design via authentication tests, In: Proc. of the 2002 IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 2002.92-103. http://ieeexplore.ieee.org/ie15/7957/21985/01021809.pdf?tp=&arnumber- 1021809&isnumbet=21985.
  • 9Woo TYC, Lam SS. A semantic model for authentication protocols, In: Proe. of the 1993 IEEE Computer Society Symp. on Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 178-194. http://ieeexplore.ieee.org/iel2/902/7168/00287633.pdf?tp=&arnumber=287633&isnumber=7168.
  • 10Song DXD. Athena: A new efficient automatic checker for security protocol analysis. In: Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 192-202. http://ieeexplore.ieee,org/ie15/6332/16921/00779773.pdf?tp=&arnumber=779773&isnumber= 16921.

共引文献30

同被引文献23

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部