期刊文献+

分析安全协议猜测攻击的模态逻辑方法

Modal Logic Approach for Analyzing Security Protocol Guessing Attacks
下载PDF
导出
摘要 以CKT5逻辑为基础,对其进行了多方面重要的扩展;在原有对称密钥机制的基础上,增加了公开密钥机制和Vernam加密机制以增强其描述协议的能力;打破完善加密假设,给出了一组定义和规则使主体具备猜测和验证口令的能力;给出了与在线猜测攻击相关的定理以反映在线猜测攻击的特点;通过相关引理和定理的证明,简化了猜测攻击的分析过程,使该文方法比现有方法更加简洁高效.扩展后的逻辑能够用于分析安全协议的猜测攻击,包括在线猜测攻击. In the field of security protocol formal verification, it is a new challenge to analyze security protocol guessing attacks. CKT5 logic, used as the base, is significantly extended in several aspects. Both public key cryptography and Vernam encryption are added to symmetric key cryptography of the original logic, which makes it more powerful in expressing security protocols. Perfect encryption hypothesis is not obeyed any more, and a series of definitions and rules are given to allow principals to guess and verify passwords. Theorems and lemmas given in this paper can describe features of on-line guessing attacks, and simplify the analysis procedure of guessing attacks. The extended logic can be used to analyze guessing attacks on security protocols including on-line guessing attacks.
出处 《计算机学报》 EI CSCD 北大核心 2007年第6期924-933,共10页 Chinese Journal of Computers
关键词 安全协议 猜测攻击 CKT5逻辑 模态逻辑 形式化分析 security protocol guessing attacks CKT5 logic modal logic formal analysis
  • 相关文献

参考文献21

  • 1卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:117
  • 2Catherine Meadows.Formal verification of cryptographic protocols:A survey//Proceedings of the Asiacrypt'94,LNCS 917.Berlin:Springer Verlag,1995:135-150
  • 3Clark J,Jacob J.A survey of authentication protocol literature:Version 1.0.1997.http://www-users.cs.york.ac.uk/~jac/papers/drareviewps.ps
  • 4Bond M,Clulow J.Extending security protocols analysis:New challenges//Proceedings of the First Automated Reasoning and Security Protocols Analysis.Cork,Ireland,2004:13-24
  • 5Lowe G.Analysing protocols subject to guessing attacks.Journal of Computer Security,2004,12(1):83-98
  • 6Malladi S,Alves-Foss J,Malladi S.What are multi-protocol guessing attacks and how to prevent them//Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises.Pittsburgh,Pennsylvania,2002:77-82
  • 7Corin R,Malladi S,Alves-Foss J,Etalle S.Guess what?Here is a new tool that finds some new guessing attacks//Proceedings of the Workshop on Issues in the Theory of Security.Warsaw,Poland,2003
  • 8Corin R,Doumen J,Etalle S.Analysing password protocol security against off-line dictionary attacks//Proceedings of the Second International Workshop on Issues in Security and Petri Nets.Bologna,Italy,2004
  • 9Delaune S,Jacquemard F.A theory of dictionary Attacks and its Complexity//Proceedings of the 17th Computer Security Foundations Workshop.Pacific Grove,CA,2004:2-15
  • 10Dolev D,Yao A.On the security of public key protocols.IEEE Transactions on Information Theory,1983,29(2):198-208

二级参考文献24

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2Dolev D,Yao A.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208.
  • 3Ulf Carlsen.Cryptographic protocol flaws:know your enemy[C].In:Proceedings of 7th IEEE Computer Security Foundations Workshop.Menlo Park,CA:IEEE Computer Society Press,1994.192-200.
  • 4Catherine Meadows.Formal methods for cryptographic protocol analysis:emerging issues and trends[J].IEEE Journal on Selected Areas in Communication,2003,21(1):44-54.
  • 5James L.Massey.An introduction to contemporary cryptology[J].Proceedings of the IEEE,1988,76(5):533-548.
  • 6Judy H.Moore.Protocol failures in cryptosystems[J].Proceedings of the IEEE,1988,76(5):594-602.
  • 7Clark J,Jacob J.A survey of authentication protocol literature[EB/OL].Version 1.0.1997.23-36.http://www-users.cs.york.ac.uk/~jac/papers/drareviewps.ps
  • 8Boyd C.Hidden assumptions in cryptographic protocols[J].Proceedings of the IEE,1990,137(6):433-436.
  • 9Stubblebine S,Gligor V.On message integrity in cryptographic protocols[C].In:Proceedings of the IEEE Computer Society Symposium on Security and Privacy.Oakland CA:IEEE Computer Society Press,1992.85-104.
  • 10Bellovin S.M.Problem areas for the IP security protocols[C].In:Proceedings of the 6th Usenix UNIX Security Symposium.San Jose,CA,1996.205-214.

共引文献174

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部