期刊文献+

串空间模型的原理与应用 被引量:2

Theory and application of strand spaces model
下载PDF
导出
摘要 介绍了安全协议形式化分析方法串空间模型的基本概念,给出了检查消息机密性的定理的变形公式,形式化地证明了由未泄漏私钥签字的消息起源于诚实主体串,并利用上述结论检验了BAN修改后的CCITTX.509(3)协议的机密性和认证性。 The basic notion of strand spaces model was introduced, then a equivalence formula checking secrecy of messages was given, and it was proven that a signed message by a confidential private key had its origin in a honest strand. Finally these two conclusions were used to check BAN modified version of CCITT X.509(3) protocol.
出处 《计算机应用》 CSCD 北大核心 2005年第8期1747-1749,1752,共4页 journal of Computer Applications
基金 现代通信国家重点实验室基金资助项目(51436040305DZ4001) 国家重点基础研究发展规划资助项目(G1999035803)
关键词 密码协议 串空间 CCITT X.509协议 <Keyword>cryptographic protocol strand spaces CCITT X.509 protocol
  • 相关文献

参考文献5

  • 1THAYER FJ, HERZOG JC, GUTTMAN JD. Strand spaces: Proving security protocols correct[ J]. Journal of Computer Security, 1999, 7(2,3): 191 ~230.
  • 2THAYER FJ, HERZOG JC, GUTTMAN JD. Strand spaces: Why is a security protocol correct[ A]. Proceedings of the 1998 IEEE Symposium on Security and Privacy[ C]. Los Alamitos: IEEE Computer Society Press, 1998. 160 - 171.
  • 3THAYER FJ, HERZOG JC, GUTTMAN JD. Strand spaces: Honest ideals on strand spaces[ A]. Proceedings of the 1998 IEEE Computer Security Foundations Workshop[ C]. Los Alamitos: IEEE Computer Society Press, 1998. 66 -77.
  • 4HOARE CAR. Communicating Sequential Processes[ M]. Prentice Hall, 1985.
  • 5SYVERSON PF, VAN OORSCHOT PC. A Unified Cryptographic Protocol Logic[ R]. NRL CHACS Report 5540 -227, 1996.

同被引文献9

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部