期刊文献+

TMN密码协议的SMV分析 被引量:1

Using SMV to Analyze the TMN Protocol
下载PDF
导出
摘要 SMV是分析有限状态系统的一种工具,三方密码协议运行模式分析法是分析密码协议的有效方法之一。为了说明这种方法的可行性,使用三方密码协议运行模式分析法,并借助状态探测工具SMV分析了TMN密码协议,并成功地找到了对TMN协议的19种攻击。 This paper proposes a method to analyze cryptographic protocols using running-mode analysis of the three-party cryptographic protocols and SMV (a tool for checking finite state systems). To prove its feasibility, an example to analyze the TMN protocol using the proposed method is also demonstrated and 19 attacks are successfully discovered.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第8期49-51,98,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60102004 60273027 60025205)
关键词 运行模式分析法 TMN协议 SMV Running-mode analysis TMN protocol Symbolic model verifier (SMV)
  • 相关文献

参考文献8

  • 1SMV.http://www.cs.cmu.edu/~modelcheck/
  • 2Tatebayashi M,Matsuzaki N,Newman D B. Key Distribution Protocol for Digital Mobile Communication Systems. In Advancein Cryptology--CRYPTO'89,Springer-Verlag,1989: 324-333
  • 3McMillan K L. Symbolic Model Checking. Kluwer Academic Publisher,1993
  • 4Lowe G. Towards a Completeness Result for Model Checking of Security Protocols. Journal of Computer Security,1999,7(2/3): 89-146.
  • 5Zhang Yuqing,Li Jihong,Xiao Guozhen. An Approach to the Formal Verification of the Two-party Cryptographic Protocols. ACM Operating Systems Review,1999,33(4): 48-51
  • 6刘秀英,张玉清,杨波,邢戈.三方密码协议运行模式分析法[J].中国科学院研究生院学报,2004,21(3):380-385. 被引量:5
  • 7Lowe G,Roscoe A W. Using CSP to Detect Errors in the TMN Protocol. IEEE Transactions on Software Engineering,1997,23(10): 659-669
  • 8刘秀英,张玉清,杨波,邢戈.TMN协议的攻击及其分类研究[J].计算机工程,2004,30(16):47-50. 被引量:3

二级参考文献15

  • 1Z Dang, R A Kemmerer. Using the ASTRAL model checker for cryptographic protocol analysis. In: Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols. Available via URL, 1997; http://dimacs. rutgers. edu/Workshops/Securi
  • 2Martin Abadi, Mark R Tuttle. A semantics for a logic of authentication (Extended Abstract). In: Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing. 1991. 201-216
  • 3L Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6:85-128
  • 4Gavin Lowe, A W Roscoe. Using CSP to detect errors in the TMN protocol. IEEE Transactions on Software Engineering,1997, 23(10): 659-669
  • 5Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 1996, 26(2): 113-131
  • 6Yu-Qing ZHANG, Ji-Hong LI, Guo-Zhen XIAO. An approach to the formal verification of the two- party cryptographic protocols. ACM Operating Systems Review, 1999, 33(4): 48-51
  • 7Will Marrero, Edmund Clarke, Somesh Jha. Model checking for security protocols. Technical Report CMU-SCS-97-139, Carnegie Mellon University, 1997
  • 8Gavin Lowe. Towards a completeness result for model checking of security protocols. Journal of Computer Security, 1999, 7(2 -3) :89-146
  • 9J C Mitchell, M Mitchell, U Stern. Automated analysis of cryptographic protocols using Murtψ. In: Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1997. 141-151
  • 10Tatebayashi M,Matsuzaki N,Newman D B.Key Distribution Protocol for Digital Mobile Communication Systems. In Advance in Cryptology CRYPTO′89, Volume 435 of LNCS,Springer-Verlag, 1989:324

共引文献6

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部