期刊文献+

认证测试方法对X.509认证协议的分析 被引量:2

Analysis of X.509 Authentication Protocol via Authentication Test
下载PDF
导出
摘要 采用认证测试方法对X.509协议的认证正确性进行了分析,该方法比BAN逻辑分析得到的结论更具体,比传统串空间理论构造集合寻找M-minimal元素的方法更为简单直观。然后针对分析结论提出了改进协议,并使用认证测试方法证明了改进协议在保持数据保密性完整性的同时,也能实现认证的正确性。 This paper analyzes X.509 authentication protocol with Authentication Test in Strand Space.The conclusion is more concrete than that achieved using BAN Logic,and the proving process is simpler and ocularrer than the traditional method of constructing the set and finding the M-minimal element in the set.Then we come up with an improved version based on the analysis conclusion,and prove with Authentication Test that the improved protocol can realize the correctness of authentication while keeping the secrecy and integration goal of the original protocol.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第8期23-25,共3页 Computer Engineering and Applications
基金 国家863高技术研究发展计划资助项目(编号:863-104-03-01)
关键词 串空间 认证测试 协议形式化分析 X.509协议 strand space,Authentication Test,protocol formal analysis method,X.509 protocol
  • 相关文献

参考文献9

  • 1Lowe G.An Attack on the Needham-Schroeder Public-Key Authentication Protocol[J].Information Processing Letters,1995;56(3):131~136
  • 2F Javier Thayer Fabrega,Jonathan C Herzog,Joshua D Guttman.Strand Space:Why is a security protocol correct[C].In:Proc 18th IEEE Symposium on Research in Security and Privacy,IEEE Computer Society Press,1998-01
  • 3F Javier Thayer Fabrega,Jonathan C Herzog,Joshua D Guttman.Strand Space:Proving security protocols correct[J].Journal of Computer Security7,1999;7:191~230
  • 4F Javier Thayer Fabrega,Jonathan C Herzog,Joshua D Guttman.Honest ideals on strand space[C].In:Proc 11th IEEE Computer Security Foundations Workshop(CSFW),IEEE Computer Society Press,1998-01
  • 5CCITT.The directory-authentication framework,version 7[S].CCITF draft recommendation X.509,CCITT,Gloucester,1987-12
  • 6Michael Burrows,Martin Abadi,Roger Needham.A logic of Authentication[R].Technical Report 39,Digital Systems Research Center,1989-02
  • 7J D Guttman,F J Thayer.Authentication tests and the structure of bundles[J].Theoretical Computer Science,2001
  • 8J D Guttman,F J Thayer.Key Compromise,Strand Spaces and the Authentication Tests[M].
  • 9蒋睿,李建华,潘理.基于Strand Space模型的CCITT X.509协议分析[J].上海交通大学学报,2004,38(z1):169-173. 被引量:4

二级参考文献9

  • 1[1]Gritzalis S, Spinellis D, Georigiadis P. Security protocols over open networks and distributed systems:formal methods for their analysis, design, and verification [J]. Computer Communications, 1999,22 (8):695-707.
  • 2[2]Burrows M, Abadi M, Needham R. A logic of authentication [J]. ACM Transactions on Computer Systems, 1990, 8(1): 18-36.
  • 3[3]FabregaF, Herzog J,Guttman J. Strand space: why is a security protocol correct [A]. Proceedings of the 1998 IEEE Symposium on Security and Privacy[C].California, USA: IEEE Computer Society Press,1998. 160-171.
  • 4[4]Fabrega F , Herzog J,Guttman J. Honest ideals on strand space [A]. Proceedings of the IEEE Computer Security Foundations Workshop XI[C]. California,USA: IEEE Computer Society Press, 1998.66- 77.
  • 5[5]Guttman J, Fabrega F. Authentication tests [A].Proceedings of the 2000 IEEE Symposium on Security and Privacy [C]. California, USA: IEEE Computer Society Press, 2000.
  • 6[6]Herzog J . The Diffie-Hellman key-agreement scheme in the strand-space model[A]. Proceedings of the 16th IEEE Computer Security Foundation Workshop[C]. California, USA: IEEE CS Press, 2003.
  • 7[7]Guttman J. Security protocol design via authentication tests [A]. Proceedings of the 15th IEEE Computer Security Foundation Workshop [C]. California, USA: IEEE Computer Society Press, 2002.
  • 8[8]CCITT X. 509. The directory - an authentication framework[S]. 1998.
  • 9[9]Fabrega F, Herzog J, Guttman J. Strand space:proving security protocols correct [J]. Journal of Computer Security,1999, 7(2/3): 191-230.

共引文献3

同被引文献16

  • 1邓淼磊,周保群,熊选东.链空间方法在密码协议设计中的应用[J].计算机工程与应用,2005,41(5):92-95. 被引量:1
  • 2杨明,罗军舟.基于认证测试的安全协议分析[J].软件学报,2006,17(1):148-156. 被引量:16
  • 3李谢华,李建华,杨树堂.基于认证测试的通用安全协议设计方法[J].上海交通大学学报,2006,40(3):524-527. 被引量:4
  • 4王鹏,李谢华,陆松年.基于认证测试方法的EAP-AKA协议分析[J].计算机工程与应用,2007,43(15):157-159. 被引量:9
  • 5Guttman J D,Fàbrega F J T.Authentication tests[C] //Proceed-ings of the2000IEEE Symp on Security and Privacy.Los Alamitos:IEEE Computer Society Press,2000:96-109.
  • 6Guttman J D,Fàbrega F J T.Authentication tests and the structure of bundles[J].Theoretical Computer Science,2002,283(2):333-380.
  • 7Guttman J D,Fàbrega F J T.Key compromise,strand spaces and the authentication tests[C] //Proceedings of the17th Conf on the Mathematical Foundations of Programming Semantics.[S.l.] :Elsevier BV,2001:141-161.
  • 8Fàbrega F J T,Herzog J C,Guttman J D.Strand spaces:why is a security protocol correct[C] //Proceedings of the1998IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society Press,1998:160-171.
  • 9Fàbrega F J T,Herzog J C,Guttman J D.Strand spaces:prov-ing security protocols correct[J].Journal of Computer Security,1999,7(2/3):191-230.
  • 10Fabrega F J T,Herzog J C,Guttman J D.Honest ideals on strand space[C] //Proceedings of the11th IEEE Computer Security Foundations Workshop.Washington:IEEE Computer Society Press,1998:66-77.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部