期刊文献+

New Semantic Model for Authentication Protocols in ASMs 被引量:5

New semantic model for authentication protocols in ASMs
原文传递
导出
摘要 A new semantic model in Abstract State Model (ASM) for authentication protocols is presented. It highlights the Woo-Lam's ideas for authentication, which is the strongest one in Lowe's definition hierarchy for entity authentication. Apart from the flexible and natural features in forming and analyzing protocols inherited from ASM, the model defines both authentication and secrecy properties explicitly in first order sentences as invariants. The process of proving security properties with respect to an authentication protocol blends the correctness and secrecy properties together to avoid the potential flaws which may happen when treated separately. The security of revised Helsinki protocol is shown as a case study. The new model is different from the previous ones in ASMs. A new semantic model in Abstract State Model (ASM) for authentication protocols is presented. It highlights the Woo-Lam's ideas for authentication, which is the strongest one in Lowe's definition hierarchy for entity authentication. Apart from the flexible and natural features in forming and analyzing protocols inherited from ASM, the model defines both authentication and secrecy properties explicitly in first order sentences as invariants. The process of proving security properties with respect to an authentication protocol blends the correctness and secrecy properties together to avoid the potential flaws which may happen when treated separately. The security of revised Helsinki protocol is shown as a case study. The new model is different from the previous ones in ASMs.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第4期555-563,共9页 计算机科学技术学报(英文版)
基金 国家自然科学基金,国家高技术研究发展计划(863计划),国家重点基础研究发展计划(973计划),the Foundation for Extraordinary Young Researchers under
关键词 cryptographic protocol formal analysis abstract state machine (ASM) authentication protocol cryptographic protocol formal analysis abstract state machine (ASM) authentication protocol
  • 相关文献

参考文献22

  • 1Meadows C A. Formal verification of cryptographic protocols: A survey. In ASIACRYPT: International Conference on the Theory and Application of Cryptology, Wollongong, Australia, LNCS 917, Springer-Verlag, 1994, pp.133-150.
  • 2Burrows M, Abadi M, Needham R. A logic of authentication. ACM Trans. Computer Systems, February 1990, 8:18 36.
  • 3Meadows C. Invariant generation techniques in cryptographic protocol analysis. In the 13th Computer Security Foundations Workshop, IEEE Computer Society,Cambridge, England, July 2000, pp.159-167.
  • 4Meadows C. Language generation and verification in the NRL protocol analyzer. In 9th IEEE Computer Security Foundations Workshop, IEEE Computer Society,Kenmare, Ireland, 1996, pp.48-61.
  • 5Schneider S. Verifying authentication protocols with CSP. In The 10th Computer Security Foundations Workshop, Cambridge, England, IEEE Computer Society, June 1997, pp.l-I5.
  • 6Thayer J, Herzog J, Guttman J. Honest ideals on strand spaces. In 11th IEEE Computer Security Foundations Workshop, IEEE Computer Society, Rockport. Massachusetts, USA, 1998, pp.66-78.
  • 7Paulson L. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6(1): 85-128.
  • 8Canetti R. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42rid FOCS, Las Vegas, Nevada, IEEE, October 2001,pp. 136-145.
  • 9Woo T Y C, Lam S S. A semantic model for authentication protocols. In IEEE Symposium on Research in Security and Privacy, Oakland, May 1993, pp.178-194.
  • 10Bella G, Riccobene E. Formal analysis of the kerberos authentication system. Journal of Universal Computer Science, December 1997, 3:1337 1381.

同被引文献16

引证文献5

二级引证文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部