期刊文献+

一种面向主体的密码协议设计逻辑

An Agent-Oriented Logic for Design of Cryptographic Protocols
下载PDF
导出
摘要 文章给出了面向主体的密码协议设计逻辑;根据提供的不同安全服务,将密码协议中的密码机制抽象为不同信道;形式化地描述了密码协议目的细化、不同消息元素对安全服务的需求、消息与协议运行环境的关联性、消息内容的全信息性和消息优化,将它们作为密码协议的设计规则和预防攻击的方法;在密码协议的设计步骤中考虑了密码协议的目的、主体的角色及其特性、密码机制、初始假设和消息内容的设计;根据给出的设计逻辑、设计规则和设计步骤形式化和系统化地设计了一个新的基于挑战/响应相互身份认证和Diffie-Hellman密钥协商机制的密码协议;最后将本文设计的逻辑与BSW逻辑进行了比较。 In the paper we provide an agent-oriented logic to design cryptographic protocols. According to their various security services, cryptographic mechanisms are abstracted to various channels in cryptographic protocols. We formally describe refinements for goals of cryptographic protocols, requirements of security services which various message components need, association between messages and environments in which protocols run, full information of message contents and optimization of messages, and we regard them as design rules and methods to prevent attacks. In design steps for cryptographic protocols, we consider how to design their goals, agents’roles and characteristics, cryptographic mechanisms, initial assumptions and message contents. According to the design logic, design rules and design steps above, we formally and systematically design a new cryptographic protocol which is based on challege-response mutual authentication and Diffie-Hellman key agreement. At last we compare our logic and the BSW logic.
出处 《微电子学与计算机》 CSCD 北大核心 2005年第5期46-56,共11页 Microelectronics & Computer
关键词 主体 逻辑 认证 密钥协商 信道 Agent, Logic, Authentication, Key agreement, Channel
  • 相关文献

参考文献23

  • 1M Burrows, M Abadi and R Needham. A Logic of Authentication. ACM Transactions on Computer Systems. 1990, 8:18~36.
  • 2Li Gong, Rong Needham and Raphael Yahalom. Reasoning about Belief in Cryptographic Protocols. Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy. 1990, 234~248.
  • 3Paul C. van Oorschot. Extending Cryptographic Logics of Belief to Key Agreement Protocols. Proceedings of the 1st ACM Conference on Communications and Computer Security. 3-5. November 1993.
  • 4Paul F, Syverson and Paul C, van Oorschot. On Unifying Some Cryptographic Protocol Logics. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press. 1994, 14~28.
  • 5Martin Abadi and Mark R Tuttle. A Semantics for a Logic of Authentication. In Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing,ACM Press. 1991, 201~216.
  • 6A Datta, A Derek, J C Mitchell and D Pavlovic.A Derivation System for Security Protocols and its Logical Foundation. 16th IEEE Computer Security Foundations Workshop (CSFW'03). 2003, 109~125.
  • 7R Bird, I Gopal, A Herzberg, P A Janson, S Kutten, RMolva and M Yung. Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE Journal on selected areas in communications. 11(5): 679~693.
  • 8W Diffie, P C Van Oorschot and M J Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes and Cryptography. 1992, 2:107~125.
  • 9T Y C Woo and S S Lam. A Lesson on Authentication Protocol Design. Operating Systems Reiew, 1994, 28(3):24~37.
  • 10M Abadi and R Needham. Prudent Engineering Practice for Cryptographic Protocols. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1994, 122~136.

二级参考文献3

  • 1李未,中国科学.A,1992年,22卷,10期,1103页
  • 2李季(译),心的分析,1958年
  • 3Kant I,纯粹理性批判,1957年

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部