期刊文献+

串空间理论的扩展及其应用 被引量:1

Extensions to Strand-space Theory and Its Applications
下载PDF
导出
摘要 基于恶意攻击软件的工作原理对串空间理论进行了扩展;分析了TLS协议的安全性,发现了一个在其它文献中未曾言明的攻击,并给出了相应的修正措施;最后,提出了设计密码协议时应注意的两点策略。 Strand-space theory based on protocol is analysed,and a attack which provided respectively.Finally,two strategies designed. vicious -attack -software is extended.Then,security of the TLS is not talked in others literature is discovered,furthermore amendment is to be paid attention to are put forward when cryptographic protocol is designed.
作者 张岚 何良生
出处 《计算机工程与应用》 CSCD 北大核心 2006年第18期136-138,共3页 Computer Engineering and Applications
关键词 串空间理论 恶意攻击软件 TLS协议 strand-space theory,vicious attack software,TLS protocol
  • 相关文献

参考文献11

  • 1D Dolev,A Yao.On the Security of Public Key Protocols[J].IEEE Transactions on Information Theory, 1983 ;29(2) : 198-208
  • 2C Meadows.Invariant generation techniques in eryptographie protocol analysis[C].In : PCSFW : Proceedings of The 13th Computer Security Foundations Workshop,IEEE Computer Society Press,2000
  • 3D X Song,S Berezin,A Perrig.Athena:A novel approach to efficient automatic security protocol analysis[J].Journal of Computer Security, 2001 ;9(1/2) :47-74
  • 4F Javier Thayer Fabrega,Jonathan C Herzog,Joshua D Guttman.Strand Spaces:Why is security protocol correct?[C].In:Proceedings of the 1998 IEEE Symposium on Security and Privacy,IEEE Computer Society. Press, 1998 : 160-171
  • 5F Javier THAYER F'abrega Jonathan C Herzog,Joshua D Guttman. Honest Ideals on Strand Spaces[C].In:Proceedings of 1998 Computer Security Foundations Workshop,Rockport,IEEE,1998
  • 6JI QingGuang,QING SiHan,ZHOU YongBin et al.Study on strand space model theory[J].J Comput, Sci & Technol,2003 ; 18 (5) : 553-570
  • 7季庆光.广义Strand space理论及其应用[C].见:信息安全国家重点实验室安全协议研讨会文集.2004
  • 8Jonathan C.Herzog The Diftle-Hellman Key-Agreement Scheme in the Strand-Space Model[C].In:Proceedings,16th IEEE Computer Security Foundations Workshop,IEEECS Press,2003
  • 9Blog:利用HTTP协议和IE的漏洞在其他计算机上运行一个程序.http://blog.csdn.net/orbit/
  • 10G Lowe.Breaking and fixing the needham-schroder public-key protocol using FDR[C].In:Tools and Algorithms for the Construction and Analysis of Systems ,Springer-Verlag, 1996 ; 1055 : 147-166

同被引文献4

  • 1JOSHUA D G,FABREGA F J T. Authentication tests [ J ]. In:Proceedings,2000 IEEE Symposium on security and Privacy. Dakland, CA, USA: IEEE Computer Society Press, 2000,10( 8 ) : 16 - 20.
  • 2GUTTMAN J D,THAYER F. Authentication tests and the structure of bundles[ J]. Theoretical Compuer Science ,2002,20( 15 ) :55 - 60.
  • 3LIU D X, LI X Y, BAY C I. An attack - finding algorithm for security protocols [ J ]. Journal of Computer Science and Technology ,2002,22( 18 ) :32 - 38.
  • 4王惠斌,祝跃飞,常青美.协议组合逻辑系统研究[J].郑州大学学报(理学版),2008,40(4):56-59. 被引量:4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部