期刊文献+

IKE2协议的安全性分析 被引量:5

Security Analysis of IKE2
下载PDF
导出
摘要 本文首先扩展了串空间的理想理论,然后应用此扩展理论分析IKE2协议的核心安全:秘密性和认证性。通过分析,证明了IKE2协议的密钥交换和认证安全性,但同时发现它不能在主动攻击模式下保护发起者身份,对此我们提出了一个修改意见。对IKE2的分析也为扩展串空间理论在复杂协议分析中的应用提供了一个实践基础。 In this paper, we first extend the ideal theory of Strand Spaces, and then apply this extended theory to analyzing a complex Internet key exchange protocol, IKE2. We focus on this protoeol's core security: keys' secrecy and authentication correctness. Through our analysis we prove that IKE2 can achieve its security goals in keys' secrecy and entity authentication. But IKE2 can't protect initiator's identity against active attack. We propose a modified main exchange of LKE2 for this bug. This analysis also gives a practical base for further application of extended Strand Spaces in analyzing complicated protocols which include plenty cryptographic primitives.
出处 《计算机科学》 CSCD 北大核心 2005年第11期59-63,123,共6页 Computer Science
关键词 安全协议 扩展串空间 理想 IKE2 安全性分析 协议分析 密钥交换 攻击模式 修改意见 空间理论 Security protocols, Extended strand spaces, Ideal, IKE2
  • 相关文献

参考文献12

  • 1aneki A P. Honest Functions and their Application to the Analysis of Cryptographic Protocols. In:Proc. of the 12th IEEE Computer security Foundations, Workshop[C], 1999. 83-89.
  • 2Fabrega F J T, Herzog J C, Guttman J D. Honest Ideals on Strand Spaces. In: Proc. of the 11th IEEE Computer Security Foundations Workshop[C], 1998. 66-77.
  • 3Fabrega F J T, Herzog J C,Guttman J D. Strand Spaces: Why is a Security Protocol Correct?. In:Proc. [C], 1998 IEEE Symposium on Security and Privacy,1998. 160-171.
  • 4Fabrega F J T, Herzog J C, Guttman J D. Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security[J],1999(7): 191-230.
  • 5Harkins D, Kaufman C, Kent S, et al. Internet Key Exchange (IKEv2)Protocol. http://www. ietf. cnri. reston. va. us/internetdrafts/draft-ietf-ipsec-ikev2-11. txt. 2003. Work in progress.
  • 6Moore K. The Internet IP Security Domain of Interpretation for ISAKMP. RFC 2407, November 1998.
  • 7Maughan D,Schertler M,Chneider M,et al. Internet Security Association and Key Management Protocol (ISAKMP). RFC 2408,November 1998.
  • 8Harkins D, Carrel D. The Internet Key Exchange (IKE). RFC 2409, November 1998.
  • 9Aiello W, Bellovin S M. Efficient, DoS Resistant,Secure Key Exchange for Internet Protocols. In:Proc. of the ACM Computer and Communications Security (CCS) Conf, Washington, DC, November 2002.
  • 10Ferguson NSchneier B. A Cryptographic Evaluation of IPSec. http://www. counterpane.com/ipsec.html. 1999.

同被引文献57

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部