期刊文献+

基于认证测试方法的EAP-AKA协议分析 被引量:9

Formal analysis of EAP-AKA protocol based on authentication tests
下载PDF
导出
摘要 EAP-AKA(Extensible Authentication Protocol-Authentication and Key Agreement)是WLAN的认证和密钥分配协议;认证测试是一种以串空间理论为基础的安全协议分析验证方法。运用认证测试方法对EAP-AKA协议的双向身份认证过程进行了分析证明,结果说明EAP-AKA能够保证移动终端和认证服务器之间的双向认证。 EAP-AKA(Extensible Authentication Protocol-Authentication and Key Agreement) is authentication and key agreement protocol of WLAN;Authentication tests is a method based on the strand space model for analyzing and verifying the security protocols.This paper uses authentication tests to analyze EAP-AKA protocol,and proves that EAP-AKA protocol can ensure the mutual authentication between WLAN-UE and 3GPP AAA.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第15期157-159,共3页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863) (the National High- Tech Research and Development Plan of China under Grant No.2005AA145110) 。
关键词 EAP-AKA协议 认证测试方法 串空间模型 3G WLAN 形式化方法 EAP-AKA protocol authentication tests strand space model 3G WLAN formal method
  • 相关文献

参考文献6

  • 1Thayer F,Herzog J C,Guttman J D.Authentication tests[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Oakland CA:IEEE Computer Society Press,2000:96-109.
  • 23GPP.TS 33.102.3G security:security architecture[EB/OL].(2000-10).http://ftp.3gpp.org/Specs/.
  • 3Guttman J D.Authentication tests and disjoint encryption:a design method for security protocols[J].Journal of Computer Security,2004,12(3/4):409-433.
  • 4Fabrega F J T,Herzog J C,Guttman J D.Strand space pictures[C]//Workshop on Formal Methods and Security Protocols,Indianapolis,Indiana,1998.
  • 5Burrows M,Abadi M,Needham R.A logic of authentication[J].ACM Transactions on Computer Systems,1990,8(1):18-36.
  • 6李谢华,李建华,杨树堂,诸鸿文.认证测试方法在安全协议分析中的应用[J].计算机工程,2006,32(2):19-22. 被引量:2

二级参考文献11

  • 1Needham R, Schroeder M. Using Encryption for Authentication in Large Networks of Computers [J]. Communications of the ACM,1978. 21 (12) : 993-999.
  • 2Stelanos G. Dioqidis S, Panagiotis G. Security Protocols over Open Networks and Distributed Systems: Formal Methods for Their Analysis, Design, and Verification [J]. Computer Communications,1999, 22(8): 695-707.
  • 3Thayer F, Herzog J C, Guttman J D. Strand Space: Why is a Security Protocol Correct?[C] Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland. CA. 1998:160-171.
  • 4Menezes A J, Oorschot P C, Vanstone S A. Handbook of Applied Cryptography[M]. CRC Press, 1996.
  • 5Thayer F, Herzog J C, Guttman J D. Authentication Tests [C].Proceedings of 2000 IEEE Symposium on Security and Privacy.Oakland, CA: IEEE Computer Society Press, 2000: 96-109.
  • 6Lowe G. An Attack on the Needham-Schroeder Public Key Authentication Protocol[J]. Information Processing Letters, 1995,56(3): 131-136.
  • 7Clark J, Jacob J. A Survey of Authentication Protocol Literature;Version 1,0 [EB/OL]. University of York, Department of Computer Science, 1997-11, http://www-uscrs.cs.york.ac.uk/-jac/under the link\Security Protocols Review.
  • 8Fabrega F J T, Herzog J C, Guttman J D. Strand Space Pictures [C].Workshop on Formal Methods and Security Protocols, Indianapolis,Indiana, 1998.
  • 9Burrows M, Abadi M, Needham R. A Logic of Authentication[J].ACM Transaction on Computer Systems, 1990, 8(1):18-36.
  • 10Song D X. Athena: A New Efficient Automated Checker for Security Protocol Analysis [C]. Proceedings of the 12^th IEEE Computer Security Foundations Workshop. Mordano, Iatly: IEEE Computer Society Press, 1999:192-202.

共引文献1

同被引文献56

引证文献9

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部