期刊文献+

一种新的共享密钥安全协议设计方法 被引量:2

A New Design Method of Shared-key Security Protocols
下载PDF
导出
摘要 为了设计出具有高安全性的安全协议,提出了一种面向主体的逻辑,可以形式化和系统地设计共享密钥安全协议;根据可以提供的不同安全服务,将密码机制抽象为不同信道,这样在设计安全协议时不必考虑密码机制的实现细节;提出安全协议的转发设计规则,将设计规则作为预防攻击的有效措施;运用该逻辑和设计规则设计了一种新的共享密钥安全协议,该协议能达到相互身份认证和密钥分发目的,并能预防与设计规则相对应的攻击。 In order to design highly secure security protocols, an agent-oriented logic is provided, which can be utilized to formally and systematically design shared key security protocols. Cryptographic mechanisms are abstracted to different channels, so that their implementation details need not be considered while security protocols are designed. Design principles of transfer are provided, which are regarded as available measures to prevent attacks. A new shared-key security protocol using the logic and design principles is designed, so as to attain mutual authentication and key distribution together with to prevent attacks that are opposite to design principles.
出处 《计算机工程》 CAS CSCD 北大核心 2006年第11期40-41,91,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2004AA1Z1090)
关键词 安全协议 主体 逻辑 信道 Security protocols Agent Logic Channel
  • 相关文献

参考文献6

  • 1Li Gong. Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols[C]. Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990:234-248.
  • 2van Oorschot P V. Extending Cryptographic Logics of Belief to Key Agreement Protocols[C]. Proceedings of the 1^st ACM Conference on Communications and Computer Security, 1993-11: 3-5.
  • 3Butty an L, Staamann S, Wilhelm U. A Simple Logic for Authentication Protocol Design[C]. 11^th IEEE Computer Security Foundations Workshop, Rockport, MA, USA, 1998-06: 9-11.
  • 4Treek D, Blazie B J. A Formal Language for Security Services Base Modelling and Analysis[J]. Computer Networks, 1995, 18(12): 921.
  • 5Abadi M, Needham R. Prudent Engineering Practicc for Cryptographic Protocols[C]. Proceedings of the IEEE Computer Society Symposiom on Research in Security and Privacy, 1994:122-136.
  • 6Datta A, Derek A, Mitchell J C, et al. A Derivation System for Security Protocols and Its Logical Foundatlon[C]. 16^th IEEE Computer Security Foundations Workshop, 2003:109-125.

同被引文献11

  • 1聂小逢,郑东,顾健.认证机构CA的安全体系设计[J].计算机工程,2004,30(B12):288-290. 被引量:5
  • 2沈昌祥.坚持自主创新 加速发展可信计算[J].计算机安全,2006(6):2-4. 被引量:17
  • 3TPM Main Part 2 TPM Structures V1.2 [ S/OL]. 2006-03-29. http :// www. trusted-computinggroup. org/.
  • 4Burrows M, Abadi M, Needham R. A logic of authentication[ J]. ACM Transaction on Computer Systems, 1990, 8 ( 1 ) : 17 - 24.
  • 5Butty an L, Staamann S, Wilhelm U. A Simple Logic for Authentication Protocol Design [ C ]. 11 th IEEE Computer Security Foundations Workshop, Rockport, MA, USA, 1998,6:9-11.
  • 6曹万华,谢蓓,吴海昕,程雄.基于DDS的发布/订阅中间件设计[J].计算机工程,2007,33(18):78-80. 被引量:30
  • 7Object Management GroupOb. Data Distribute Service for Re- al- Time System Version 1.2 [ SEB/OL]. [ 2007 - 2 ]. ht- tp ://www. omg. org. Object Management Group ,2007.
  • 8Object Management GroupOMG. DDS Security FTF Betal [SEB/OL]. [2014 -6]. http://www, omg. org. Object Management Group ,2014.
  • 9WilliamStallings.密码编码学与网络安全:原理与实践[M].孟庆树,译.第4版.北京:电子工业出版社,2006.
  • 10Object Management GroupOMG. The Real- time Publish- Subscribe Wire Protocol DDS Interoperability Wire Protocol Specification( DDS- RTPS) Version 2.1 [ EB/OL]. [ 2010 - 11]. http://www, omg. org. Object Management Group, 2010.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部