期刊文献+

Needham-Schroeder协议的认证测试方法形式化分析 被引量:1

Formal analysis of Needham-Schroeder protocol with authentication test methods
下载PDF
导出
摘要 在安全协议的形式化分析方法中,串空间模型和基于串空间模型的认证测试方法是比较常用的验证方法。针对Need-ham-Schroeder协议存在中间人攻击的缺陷,提出对协议的改进并采用认证测试方法,验证了改进的协议可以满足协议的安全目标。 Among the formalized analysis methods of security protocol,the strand space model and the authentication test methods based on the strand space model are the commonly used methods.For the defects of man-in-middle attack in the Needham-Schroeder protocol,the paper gives the improvements and adopts the authentication test methods to verify the improved Needham-Schroeder protocol can meet the demands of security goals of protocol.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第19期100-102,共3页 Computer Engineering and Applications
基金 民航局科研基地863项目(No.2007kf003)~~
关键词 安全协议 形式化分析 串空间模型 认证测试方法 Needham-Schroeder协议 security protocol formal analysis strand space model authentication test methods Needham-Schroeder protocol
  • 相关文献

参考文献10

  • 1Thayer F J,Herzog J C,Guttman J D.Strand spaces:why is a security protocol correct?[C] //Proceedings of 1998 IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society Press,1998:160-171.
  • 2Doter D,Yao A.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208.
  • 3Meadows C.Formal verification of cryptographic protocols:a survey[C] //LNCS 917:Proceedings of ASIACRYPT'94,Advances in Cryptology.Springer,1994:135-150.
  • 4Thayer F J,Herzog J C,Guttman J D.Authentication tests[C] //Proceedings of 2000 IEEE Symposium on Security and Privacy.Oakland CA:IEEE Computer Society Press,2000:96-109.
  • 5Guttman J D.Seeurity protocol design via authentication tests[C] //15th Computer Security Foundations Workshop,2002:92-103.
  • 6Guttman J D.Authentication tests and disjoint encryption:A design method for security protocols[J].Journal of Computer Security,2004,12 (3-4):409-433.
  • 7Lowe G.An attack on the Needham-Schroedor public key authentication protocol[J].Information Processing Letters,1995,56(3):131-136.
  • 8Li Xiehua.Research on formal verification methods of security protocols based on strand space model[D].2007:41-42.
  • 9Lowe G.A hierarchy of authentication specifications[C] //Proceedings of the 1997 IEEE Computer Society Symposium on Research in Security and Privacy,1997:31-43.
  • 10Song D X.Athena:a new efficient automated checker for security protocol analysis[C] //Proceedings of the 12th IEEE Computer Security Foundations Workshop.IEEE Computer Society Press,1999.

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部