期刊文献+

Analysis of security protocols based on challenge-response 被引量:1

Analysis of security protocols based on challenge-response
原文传递
导出
摘要 Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods, which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques, in which secrecy analysis is split into two parts: Explicit-lnformaUon-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand pa- rameters. This new method owns both the power of the Strand Space Model and concision of authentication logic. Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods, which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques, in which secrecy analysis is split into two parts: Explicit-lnformaUon-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand pa- rameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.
出处 《Science in China(Series F)》 2007年第2期137-153,共17页 中国科学(F辑英文版)
基金 National Natural Science Foundation of China (Grant Nos. 90412014 and 90604004) Jiangsu Provincial Key Laboratory of Network and Information Security (Grant No. BM2003201) Jiangsu Provincial High-Tech Research Program (Grant No. BG2004036)
关键词 network security protocol analysis challenge-response Strand Space Model network security, protocol analysis, challenge-response, Strand Space Model
  • 相关文献

参考文献6

二级参考文献39

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2Fabrega FJT, Herzog JC, Guttman JD. Strand spaces: Why is a security protocol correct? In: Proc. of the 1998 IEEE Symp, on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998, 160-171, http://ieeexplore.ieee.org/ie14/5528/14832/00674832.pdf? tp=&arnumber=674832&isnumber=14832.
  • 3Fitbrega FJT, Herzog JC, Guttman JD. Strand spaces: Proving security protocols corect. Journal of Computer Security, 1999,7(2-3):191-230.
  • 4Paulson LC. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6(1):85-128.
  • 5Guttman JD, F/ibrcga FJT. Authentication tests. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2000. 96-109. http://ieeexplore.ieee.org/ie15/6864/18435/00848448.pdf?.tp=&arnumber=848448&isnumber=18435.
  • 6Guttman JD, F/ibrega FJT. Authentication tests and the structure of bundles. Theoretical Computer Science, 2002,283(2):333-380.
  • 7Guttman JD. Security protocol design via authentication tests, In: Proc. of the 2002 IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 2002.92-103. http://ieeexplore.ieee.org/ie15/7957/21985/01021809.pdf?tp=&arnumber- 1021809&isnumbet=21985.
  • 8Woo TYC, Lam SS. A semantic model for authentication protocols, In: Proe. of the 1993 IEEE Computer Society Symp. on Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 178-194. http://ieeexplore.ieee.org/iel2/902/7168/00287633.pdf?tp=&arnumber=287633&isnumber=7168.
  • 9Song DXD. Athena: A new efficient automatic checker for security protocol analysis. In: Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 192-202. http://ieeexplore.ieee,org/ie15/6332/16921/00779773.pdf?tp=&arnumber=779773&isnumber= 16921.
  • 10Song D, Berezin S, Pcrrig A. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 2001,9( 1):47-74.

共引文献57

同被引文献17

  • 1徐国强,高献坤,田辉,候瑞娟,余泳昌.精细农业研究[J].农机化研究,2004,26(6):1-5. 被引量:12
  • 2韩毅,周晏.使用Winsock实现C/S网络通信[J]科技信息(科学教研),2007(36).
  • 3梁学东,田日才.无线传感器网络与TCP/IP网络互联的设计与实现[A]无线传感器网及网络信息处理技术——年通信理论与信号处理年会论文集,2006.
  • 4Martin Bachmaier,Markus Gandorfer.A conceptual framework for judging the precision agriculture hypothesis with regard to site-specific nitrogen application[J]. Precision Agriculture . 2009 (2)
  • 5Bramley R G V.Lessons from nearly20years of Precision Agriculture research,development,and adoption as a guide to its appropriate application. Crop&Pasture Science . 2009
  • 6Bachmaier M,Gandorfer M.A conceptual framework for judging the precision agriculture hypothesis with regard to site-specific nitrogen application. Precision Agriculture . 2009
  • 7Guimaraes A A,Saraiva A M.Analysis of the ISO11783CAN-Bus based protocol:its interpretation and usage on a precision farming application. Proceedings of the7th International Conference on Precision Agriculture and Other Precision Resources Management . 2004
  • 8Hui Fang,Yong He.A pocket PC based field information fast collection system. Computer and Electronics in Agri-culture . 2008
  • 9王宝英,蔡雪梅,梅春燕,刘鹏.基于ZigBee技术的智能交通网络研究[J].重庆邮电大学学报(自然科学版),2007,19(6):748-751. 被引量:16
  • 10李勇,包世泰,周品,谭建军.基于Winsock的AIS基站网络数据传输研究[J].计算机工程与设计,2008,29(4):949-951. 被引量:4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部