期刊文献+

基于分层的网络安全协议验证方法 被引量:1

Layer-based Model for Security Protocol Authentication
下载PDF
导出
摘要 提出了一种新的基于分层的网络安全协议验证方法。首先对要验证的安全属性进行划分,将其分成若干安全子属性;其次对要进行验证的安全协议在安全性等价的条件下进行转换;然后逐步剖分成一个自底向上的多层协议,如果每一层子协议满足所要验证的安全属性的一个子属性,那么这个协议即可被证明是安全的。这种方法相比于传统的验证方法,不但高效,而且完备性更佳。 This paper presents a new layer-based method for the verification of security protocols. Firstly, it shows how to divide a security property which a protocol should respect into several sub-properties. Then, without changing its security prope rty, transform the protocol we want to prove safe and divide it into a multi-layer protocol in a way there are as many sub-layers as sub-properties. If ever y sub-layer can be proved to respect the property of a sub-destination, it can d raw the conclusion that the whole protocol also respects the initial property, in other words, the protocol is guaranteed to be secure. Compared with traditional verification method, this method is not only more efficient but also more complete.
出处 《计算机应用研究》 CSCD 北大核心 2005年第7期143-145,共3页 Application Research of Computers
关键词 安全协议 层次化 验证方法 Security Protocol Layer-based Authentication Method
  • 相关文献

参考文献19

  • 1M Burrows, M Abadi, R Needham. A Logic of Authentication[J].ACM Transactions on Computer Systems, 1990,8(1):18-36.
  • 2R Needham, M Schroeder. Authentication Revisited[J]. ACM Operating Systems Review, 1987,21(1):7.
  • 3R Needham, M Schroeder. Using Encryption for Authentication in Large Networks of Computers[J]. Communications of ACM, 1978,21(12):993-999.
  • 4L Gong, R Needham, R Yahalom. Reasoning about Belief in Cryptographic Protocols[C]. Oakland, California: Proceedings of the IEEE Symposium on Research in Security and Privacy, 1990. 234-248.
  • 5M Abadi, M Turtle. A Semantics for a Logic of Authentication[C].Proceedings of the 10th ACM Symposium on Principles of Distributed Computing, ACM Press, 1991. 201-216.
  • 6Paul F Syverson, Paul C van Orschot. On Unifying Some Crypto-Graphic Protocol Logics [C]. Los Alamitos, California : Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1994.14-28.
  • 7P F Syverson, P C van Orschot. An Unified Cryptographic Protocol Logic[R]. NRL CHACS Report, 1996.
  • 8G Lowe. Breaking and Fixing the Needham-Schroeder Public-key Protocol Using FDR[C]. Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science, Springer-Verlag, 1996. 147-166.
  • 9G Lowe. A Hierarchy of Authentication Specifications[C]. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1997.31-43.
  • 10J C Mitchell, M Mitchell, U Stern. Automated Analysis of Cryptographic Protocols Using Mur Ф[C]. Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1997.

同被引文献4

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部