期刊文献+

基于Petri网的密码协议分析 被引量:2

Analysis of Cryptographic Protocols Based on Petri Nets
下载PDF
导出
摘要 在Federico提出的一种密码协议进程语言的基础上,建立了便于进行密码协议分析的简化Petri网模型,给出了协议满足秘密性的充要条件,并以NS公钥协议为例,用Petri网模型,结合归纳方法和串空间分析方法从密钥、新鲜数和协议主体三个方面的秘密性分析了该协议的秘密性,简化了协议秘密性的分析。 We present a simplified Petri net model to analyse cryptographic protocols based on a kind of security protocol language proposed by Federico. Sufficient and necessary conditions to achieve the security of cryptographic protocols are given in the paper. With the proposed Petri net model, we prove the security of the NS authentication protocol which incorporates the inductive method and the strand space model, and describe the security of the NS protocol in detail according to the secrecy of key, nounee and responders' identity. The analysis of cryptographic protocols is greatly simplified because of the proposed Petri net model.
出处 《计算机工程与科学》 CSCD 2006年第2期24-27,共4页 Computer Engineering & Science
基金 国家863计划资助项目(863-307-7-5)
关键词 PETRI网 事件 秘密性 Petri net event secrecy property
  • 相关文献

参考文献7

  • 1M Burrows, M Abadi, R Needham. A Logic of Authentication[J]. ACM Trans on Computer Systems, 1990,8(1): 18-36.
  • 2F Thayer,C J Herzog, D J Guttman. Strand Space,Why Is a Security Protocol Correct[A]. Proc of the 1998 IEEE Syrup on Security and Privacy[C]. 1998. 160-171.
  • 3J Thayer, J Herzog, J Guttman. Honest Ideals on Strand Spaces[A]. Proe of the 11th IEEE Computer Security Foundations Workshop[C]. 1998.
  • 4L C Paulson. The Inductive Approach to Verifying Cryptographic Protocols[J]. Journal of Computer Security, 1998, 6(1): 85-128.
  • 5T Aura, Modelling the Needham-Schroeder Authentication Protocol with High level Petri Nets[R]. Technical Report B14, Helsinki University of Technology, 1995.
  • 6F Grazzolara, G Winskel. Language, Semantics, and Methods for Cryptographic Protocols[R]. Technical Report RS-00-18,2000.
  • 7L C Paulson. Proving Security Protocols Correct[A]. Proc of the 14th Syrup on Logic in Computer Science[C]. 1999.

同被引文献19

  • 1刘道斌,郭莉,白硕.基于Petri网的安全协议形式化分析[J].电子学报,2004,32(11):1926-1929. 被引量:5
  • 2郑君杰,肖军模,杨明,刘志华,叶松,周延年.基于有色Petri网的安全协议安全性仿真[J].系统仿真学报,2006,18(11):3294-3296. 被引量:3
  • 3林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 4范科峰,莫玮,曹山,赵新华,裴庆祺.数字版权管理技术及应用研究进展[J].电子学报,2007,35(6):1139-1147. 被引量:62
  • 5MillenJ,Rueb H.Protocol-independent secrecy[A].Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Berkeley,California,2000.110-120.
  • 6Canetti R.A unified f ramework for analyzing security of protocols(preliminary version)[R].Electronic Colloquium on Computational Complexity,ECCC Report TR012016,2001,8(16).
  • 7Yingjiu Guo,Chuang Lin,Hao Yin.Design and analysis of IPTV digital copyright management security protocol[A].Intelligent Signal Processing and Communication Systems[C].Xiamen,China,2007.554-557.
  • 8Federico Oazzolara,Glynn Winskel.Petri nets in cryptographic protocols[A].Parallel and Distributed Processing Symposium,Proceedings 15th International[C].San Francisco,CA,IEEE Computr Society Apr 2001 page(s):1507-1515.
  • 9Mei Lin Hui,Gavin Lowe.Safe simplifying transformations for security protocols or not just the needham schroeder public key protocol[A].12th IEEE Computer Security Fondations Workshop[C].Mordano,Italy:IEEE Computer Society Press,June 28-30,1999.32-43.
  • 10Dolev D,Yao A.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部