期刊文献+

分析安全协议密码系统相关缺陷的模态逻辑方法 被引量:2

Model Logic Approach for Analyzing the Flaws of Security Protocol Cryptosystem-related Flaws
下载PDF
导出
摘要 安全协议未采用适当的密码系统来实现,会使最终的安全协议存在密码系统相关缺陷.对该类缺陷进行形式化分析时,不能使用完善的密码系统假设,这是安全协议形式化分析研究中的一个难点.以CKT 5逻辑为基础,以对称密码算法为重点,将序列密码算法和分组密码算法的特性,以逻辑推理规则的形式引入到CKT 5逻辑框架中,使得扩展后的逻辑能够用于分析安全协议密码系统相关缺陷.并用实例说明了如何使用扩展逻辑来分析密码系统相关缺陷. A security protocol implemented with an improper cryptosystem may have cryptosystem-related flaws. It is difficult to analyze this kind of flaws because the perfect encryption hypothesis cannot be used. CKT5 logic is extended. Focused on the symmetric key cryptography ,the properties of the stream cipher and the block cipher are introduced into the logical framework of CKT5 in the form of logical inference rules, which make the extended logic to be capable to analyze the cryptosystem-related flaws. An examole is given to illustrate how to use the extended logic to analyze the cryptosystem-related flaws.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第7期1223-1228,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60404004)资助.
关键词 安全协议 形式化分析 模态逻辑 CKT5逻辑 密码系统相关缺陷 security protocol formal analysis modal logic CKT5 logic cryptosystem-related flaws
  • 相关文献

参考文献19

  • 1Dolev D,Yao A.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208.
  • 2Ulf Carlsen.Cryptographic protocol flaws:know your enemy[C].In:Proceedings of 7th IEEE Computer Security Foundations Workshop.Menlo Park,CA:IEEE Computer Society Press,1994.192-200.
  • 3Catherine Meadows.Formal methods for cryptographic protocol analysis:emerging issues and trends[J].IEEE Journal on Selected Areas in Communication,2003,21(1):44-54.
  • 4James L.Massey.An introduction to contemporary cryptology[J].Proceedings of the IEEE,1988,76(5):533-548.
  • 5Judy H.Moore.Protocol failures in cryptosystems[J].Proceedings of the IEEE,1988,76(5):594-602.
  • 6Clark J,Jacob J.A survey of authentication protocol literature[EB/OL].Version 1.0.1997.23-36.http://www-users.cs.york.ac.uk/~jac/papers/drareviewps.ps
  • 7Boyd C.Hidden assumptions in cryptographic protocols[J].Proceedings of the IEE,1990,137(6):433-436.
  • 8Stubblebine S,Gligor V.On message integrity in cryptographic protocols[C].In:Proceedings of the IEEE Computer Society Symposium on Security and Privacy.Oakland CA:IEEE Computer Society Press,1992.85-104.
  • 9Bellovin S.M.Problem areas for the IP security protocols[C].In:Proceedings of the 6th Usenix UNIX Security Symposium.San Jose,CA,1996.205-214.
  • 10Wenbo Mao,Colin Boyd.Development of authentication protocols:some misconceptions and a new approach[C].In:Proceedings of the 7th Computer Security Foundations Workshop.IEEE Computer Society Press,1994.178-186.

二级参考文献6

共引文献173

同被引文献29

  • 1黎波涛,罗军舟.不可否认协议时限性的形式化分析[J].软件学报,2006,17(7):1510-1516. 被引量:13
  • 2Kudo M. Electronic submission protocol based on temporal accountabil2ity[C] ffProe, of 14th Annual Computer Security Application Conf. Phoenix: ACSA, 1998. 3532363.
  • 3Coffey T,Saidha P. Logic for verifying public-key cryptographic protocols[J].IEEE Proc Computers and Digital Techniques, 1997,144(1) : 28-32.
  • 4Kudo M, Mathuria A. An Extended Logic for Analyzing Timed- Release Public-Key Protocols[J]. ICICS, 1999:183-198.
  • 5Bieber P. A logic of communication in hostile environment[C]//Proceedings of the Third IEEE Computer Security Foundations Workshop. Franconia, New-Hampshire: IEEE Computer Society Press, 1990 : 14-22.
  • 6Zhou J, Gollmann D. A fair non-repudiation protocol[C]//Proc. of the 1996 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society Press, 1996 : 55-61.
  • 7Kim K, Park S, Baek J. Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol[C]//Gong K, Niu Z, eds. 2000 IEEE Int'l Conf. on Communication. Beijing: IEEE Computer Society Press, 2000,3 : 1743-1747.
  • 8Li Gong,Mark Lomas,Roger Needham,Jerome Saltzer.Protecting poorly chosen secrets from guessing attacks.IEEE Journal on Selected Areas in Communications,1993,11(5):648-656
  • 9Tsudik G,Van Herreweghen E.Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks//Proceedings of the IEEE Symposium on Reliable Distributed Systems.Princeton,New Jersey,1993:136-142
  • 10Catherine Meadows.Formal verification of cryptographic protocols:A survey//Proceedings of the Asiacrypt'94,LNCS 917.Berlin:Springer Verlag,1995:135-150

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部