期刊文献+

NS公钥认证协议的另一个改进方法 被引量:2

Another Modification of NS Public-key Authentication Protocol
下载PDF
导出
摘要 将NS公钥认证协议解析为两个质询-应答型的单向认证子协议,并从消息方向标识缺失的角度对协议的设计缺陷进行了分析,在该基础上提出了针对NS公钥认证协议的另一种改进方法。 The analyzing methods are to parse NS public-key authentication protocol into two one-way authentication sub-protocols of challenge-response type and to analyze its design flaw from the view of the direction identifier loss of the message. Based on the above ways, another kind of modified version of this protocol is offered.
作者 任侠 吕述望
出处 《计算机工程》 CAS CSCD 北大核心 2004年第16期12-13,共2页 Computer Engineering
基金 国家"973"计划基金资助项目(G1999035800)
关键词 NS公钥认证协议 质询-应答 方向标识 NS public-key authentication protocol Challenge-response Direction identifier
  • 相关文献

参考文献4

  • 1Needham R,Schroeder M.Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 1978,21(12):993-999
  • 2Lowe G.An Attack on the Needham-Schroeder Public Key Authentication Protocol. Information Processing Letters, 1995,56(3):131 - 136
  • 3Lowe G.A Family of Attacks upon Authentication Protocols. Available from URL: http://ww.mcs.le.ac.uk/-g17/, 1997-01
  • 4Clark J,Jacob J. On the Security of Recent Protocols. Information Processing Letters, 1995,56(3): 151 - 155

同被引文献19

  • 1卿斯汉.密码学与计算机网络安全[M].北京:清华大学出版社,2000.127-147.
  • 2Jensen K.Colored Petri Nets:Basic Concepts,Analysis Methods and Practical Use,Volume 1.Monographs in Theoretical Computer Science,Springer-Verlag,1992.
  • 3Needham R,Schroeder M.Using Encryption for Authentication in Large Networks of Computers.Communication of the ACM,1978,21(12):993~999.
  • 4Lowe G.An Attack on the Needham-Schroeder Public Key Authentication Protocol.Information Processing Letters,1995,56(3):131~136.
  • 5Aly S,Mustafa K.Protocol Verification and Analysis Using Colored Petri Nets.2003.
  • 6World of Petri Nets.Software and Tools Page.http://www.daimi.au.dk/PetriNets/tools.
  • 7Dolev D,Yao A.On the security of public key protocols,IEEE Transactions On Information Theory[J]. 1983,29(2):198-208
  • 8Mitchell J.C. Mitchell M. ,Stern U.. Automated analysis of cryptographic protecols using Mur Ф.In:Proceedings of the 1997 leee symposium on Security and Privacy,Oakland California USA 1997:141-153
  • 9Debbabi,MejriM,TawbiN et al.Formal automatic verification of authentication cryptographic protocols[C].In:Proc of the 1st IEEE Int'l Conf on Formal Engineering Methods.Oakland,CA.1997:50 - 59
  • 10Lowe G.. Breaking and fixirg the Needham-Schroeder public-key protocol using FDR.Softwar-Concepts and Tools 1996,17(3):93-102

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部