期刊文献+

认证测试的一个扩展 被引量:2

An extension of authentication
下载PDF
导出
摘要 对Guttman等人提出的3种测试中的输入测试(incoming test)进行扩展,使其能够用来分析使用签名和验证的协议,如CCITT X.509协议等.使用扩展后的输入测试来分析CCITT X.509协议的正确性,发现它的不足之处. We present an extension of the incoming test which was introduced by Guttman et al. Then, we use it to analyze the protocols containing signing and verifying. After we apply our extension to CCITF X. 509, we find a flaw in it.
出处 《中国科学院研究生院学报》 CAS CSCD 2007年第4期488-493,共6页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家973计划(2004CB318004) 国家自然科学基金(60673069)资助
关键词 串空间 认证测试 变换实施边 变换路径 strand space, authentication test, transforming edge, transformation path
  • 相关文献

参考文献10

  • 1F Javier Thayer Fabrega,Jonathan C Herzog,Joshua D Guttman.Strand spaces:Why is a security protocol correct.In:Proceedings of the 1998IEEE Symposium on Security and Privacy,IEEE Computer Press,1998.160 - 171.
  • 2F Javier Thayer Fabrega,Jonathan C Herzog,Joshua D Gunman.Honest ideals on strand spaces.In:Proceedings of the 11th IEEE Computer Security Foundations Workshop.IEEE Computer Society Press,1998.
  • 3F Javier Thayer Fabrega,Jonathan C Herzog,Joshua D Guttman.Strand spaces:Proving security protocols correct.Journal of Computer Security,Forthcoming,1999.
  • 4Joshua D Guttman,F Javier Thayer Fabrega.Authentication tests.In:Proceedings,2000 IEEE Symposium on Security and Privacy.Dakland,CA,USA:IEEE Computer Society Press,2000.96 - 109.
  • 5Joshua D Guttmau,F Javier Thayer Fabrega.Authentication tests and the structure of bundles.Theoretical Computer Science,2002,283(2):333 -380.
  • 6Joshua D Guttman,F Javier Thayer Fabrega.Authentication tests and the normal penetrator.MTR 00B04,The MITRE Corporation,2000.
  • 7沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16
  • 8CCITT.CCITT draft recommendation X.509.The directory-authentication framework,version 7.CCITT,Gloucester,1987.
  • 9Burrows M,Abadi M,Needham R.A logic of authentication.ACM Transaction in Computer Systems,1990,8(1):18 - 36.
  • 10Dierks T,Allen C.The TLS protocol.RFC 2246.1999.

二级参考文献11

  • 1Fábrega FJT, Herzog JC, Guttman JD. Strand spaces: Proving security protocols correct. Journal of Computer Security, 1999,7(10):191-230.
  • 2Fábrega FJT, Herzog JC, Guttman JD. Authentication tests. In: Titsworth FM, ed. Proc. of the 2000 IEEE Symp. on Security and Privacy (S&P 2000). Los Alamitos: IEEE Computer Society Press, 2000. 96-109.
  • 3Fábrega FJT, Herzog JC, Guttman JD. Mixed strand spaces. In: Guttman J, ed. Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999.72-82.
  • 4Dolev D, Yao A. On the security of public-key protocols. IEEE Trans. on Information Theory, 1983,29(2):198-208.
  • 5Maneki AP. Honest functions and their application to the analysis of cryptographic protocols. In: Guttman J, ed. Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 83-89.
  • 6Anderson R, Needham R. Robustness principles for public key protocols. In: Coppersmith D, ed. Proc. of the Int'l Conf. on Advances in Cryptology (CRYPTO'95). London: Springer-Verlag, 1995. 236-247.
  • 7Harkins D, Kaufman C, Kent S, Kivinen T, Perlman R. Internet key exchange (IKEv2) protocol. 2003. http:∥www.ietf.cnri.reston.va.us/internet-drafts/draft-ietf-ipsec-ikev2-11 .txt.
  • 8Aiello W, Bellovin SM. Efficient, DOS resistant, secure key exchange for Internet protocols. In: Atluri V, ed. Proc. of the ACM Computer and Communications Security (CCS) Conf. New York: ACM Press, 2002.48-58.
  • 9Fábrega FJT, Herzog JC, Guttman JD. Protocol independence through disjoint encryption. In: Lee S, ed. Proc. of the 13th IEEE Computer Security Foundations Workshop (CSFW-13). Los Alamitos: IEEE Computer Society Press, 2000. 24-34.
  • 10Fábrega FJT, Herzog JC, Guttman JD. Honest ideals on strand spaces. In: Werner B, ed. Proc. of the 11th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1998.66-77.

共引文献15

同被引文献23

  • 1沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16
  • 2杨明,罗军舟.基于认证测试的安全协议分析[J].软件学报,2006,17(1):148-156. 被引量:16
  • 3蒋睿,胡爱群,李建华.基于Authentication Test方法的高效安全IKE形式化设计研究[J].计算机学报,2006,29(9):1694-1701. 被引量:4
  • 4Paulson L C.Inductive analysis of the Interact protocol TLS[J]. ACM Transactions on Computer and System Security,Computer Laboratory University of Cambridge, 1999: 332-351.
  • 5Calixto A,Monroy R.TLS analysis using cadp[J].Studia Informatica Universalis, 2001.
  • 6Ogata K,Futatsugi K.Equational approach to formal analysis of TLS [C]//Proceedings 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005 ).Columbus, OH, USA : IEEE Computer Society Press, 2005: 795-804.
  • 7Herzog J C.The diffie-hellman key-agreement scheme in the strandspace model[C]//Proceedings of the 16th IEEE Computer Security Foundations Workshop(CSFW'03),IEEE Computer Society,2003: 234-247.
  • 8RFC 5280.Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List(CRL)Profile[S].2008.
  • 9Dolev D,Yao A C.On the security of public key protocols[J]. IEEE Transactions on Information Theory,1983,29(2):198-208.
  • 10RFC 2246.The TLS protocol version 1.0[S].1999.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部