期刊文献+

一种新的密码协议分析方法及其应用

New approach for formal analyzing encryption protocols
下载PDF
导出
摘要 针对传统时序逻辑把协议看成封闭系统进行分析的缺点,提出一种新的基于策略的ATL(AlternatingtimeTemporalLogic)逻辑方法分析密码协议。最后用新方法对NeedhamSchroeder协议进行了严格的形式化分析,结果验证了该协议存在重放攻击。工作表明基于博弈的ATL逻辑比传统的CTL更适合于描述和分析密码协议。 Aiming at the shortcoming that traditional temporal logic regards protocols as close system to analyse, this paper proposes a ATL( Ahemating-time Temporal Logic) logical method based on game to analyse cryptographic protocols. In the end, we make strict formal analysis for needham-schroeder protocol with this new method, as a result we validate there exists reply attacks. These works indicate that the ATL logic based on game is more suitable to describe and analyze cryptographic protocols than traditional CTL.
出处 《计算机应用》 CSCD 北大核心 2006年第5期1087-1089,共3页 journal of Computer Applications
基金 贵州省自然科学基金资助项目(20042111) 贵州省教育厅自然科学基金资助项目(2004219)
关键词 密码协议 安全性 形式化分析 ATL cryptographic protocols security formal analysis ATL
  • 相关文献

参考文献9

  • 1EMERSON EA. Temporal and modal logic[A]. VAN LEEUWEN J, ed. Handbook of Theoretical Computer Science, vol B: Formal Models and Semantics, chapter 16[C]. Elsevier Publishers B. V,1990. 995 - 1072.
  • 2CLARKE EM, EMERSON EA. Design and synthesis of synchronization skeletons using branching time temporal logic[A].Logic of Programs, volume 131 of Lecture Notes in Computer Science[C].Springer-Verlag, 1981. 52-71.
  • 3ALUR R, HENZINGER TA, KUPFERMAN O. Alternating - time temporal logic[A]. 38th Annual Symposium on Foundations of Computer Science[C]. IEEE Computer Society Press, 1997. 100 - 109.
  • 4ALUR R, HENZINGER T, MANG F, et al. MOCHA: modularity in model checking[A]. Proc. CAV '98[C], 1998. 512-525.
  • 5NEEDHAM RM, SCHROEDER MD. Using Encryption for Authentication in Large Networks of Computers[J]. Communications of the ACM, 1978,21(12) :993 -999.
  • 6SCHNEIDER SA . Formal analysis of a non - repudiation protocol[A]. 11th IEEE Computer Security Foundations Workshop[C],1998. 54-65.
  • 7HENZINGER T, MAJUMDAR R, MANG F, et al. Abstract interpretation of game properties[A]. Proc. SAS '00, 2000.220-239.
  • 8陈庆锋,王驹,白硕,张师超,隋立颖.电子商务安全协议的逻辑验证[J].软件学报,2000,11(3):346-362. 被引量:6
  • 9肖德琴,周权,张焕国,刘才兴.基于时序逻辑的加密协议分析[J].计算机学报,2002,25(10):1083-1089. 被引量:15

二级参考文献6

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部