期刊文献+

一种基于关联规则的安全协议验证方法

Verification method of security protocols based on correlation rules
下载PDF
导出
摘要 提出了一种基于关联规则的安全协议形式化分析方法。从主体认证关联、消息间关联和消息内部关联三个角度去刻画协议,提出了基于以上关联特点的协议验证方法。利用该方法对W ooand Lam认证协议进行了逆向验证分析,成功推导出现有的已知攻击路径,使这些已知攻击路径的推导能统一于该验证方法;同时还发现了一个未知的攻击路径,为协议的形式化分析提供了新思路。 An approach for the formal analysis of security protocols based on the correlation rides was proposed. The character of correlation of protocols was pictured from three aspects: the correlation of authentication between principals, the correlation between messages and within the messages. The verification method was presented based on the above correlation property, which had been used to verify the Woo and Lam authentication Protocol in reverse analysis. Some known attack paths were derived successfully, and made these known attack paths can be derived from this method in unity, and also discovered an unknown attack path. The method provides a new perspective in the formal analysis of the protocols.
出处 《计算机应用》 CSCD 北大核心 2007年第8期1915-1918,共4页 journal of Computer Applications
基金 江西省自然科学基金资助项目(511010)
关键词 安全协议 关联规则 验证方法 security protocol correlation rides verification method
  • 相关文献

参考文献5

  • 1WOO T,LAM S.A semantic model for authentication protocols[C]// Proceedings of the IEEE CS Symposium on Research in Security and Privacy.Oakland:IEEE Computer Society Press,1993:178-194.
  • 2HORE C A R.Communicating sequential processes[M].New Jersey:Prentice-Hall,1985.
  • 3丁一强.基于CCS的加密协议分析[J].软件学报,1999,10(10):1102-1107. 被引量:5
  • 4周宏斌,黄连生,桑田.基于串空间的安全协议形式化验证模型及算法[J].计算机研究与发展,2003,40(2):251-257. 被引量:9
  • 5DEBBABI M,MEJRI M,TAWBI N,et al.A new algorithm for the automatic verification of authentication protocols:from specifications to flaws and attack scenarios[EB/OL].[2007-01-03].http://dimacs.rutgers.edu/Workshops/Security/program2/debbabi/index.html

二级参考文献7

  • 1J C Mitchell, M Mitchell, U Stern. Automated analysis of cryptographic protocols using Mur. In: Proc of the 1997 IEEE Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1997. 141~153
  • 2F Thayer, J C Herzog, J D Guttman. Strand spaces: Why is a security protocol correct? In: Proc of 1998 IEEE Symp on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1998
  • 3F Thayer, J C Herzog, J D Guttman. Authentication tests. In: Proc of 2000 IEEE Symp on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2000. 96~109
  • 4F Thayer, J C Herzog, J D Guttman. Protocol independence through disjoint encryption. In: Proc of the 13th IEEE Computer Security Foundations Workshop. Cambridge, England: IEEE Computer Society Press, 2000. 24~34
  • 5D X Song. Athena: A new efficient automated checker for security protocol analysis. In: Proc of the 12th IEEE Computer Security Foundations Workshop. Mordano, Italy: IEEE Computer Society Press, 1999
  • 6G Lowe. A hierarchy of authentication specifications. In: The 10th Computer Security Foundations Workshop Proceedings. Massachusetts, USA: IEEE Computer Society Press, 1997. 31~43
  • 7桑田,黄连生,张磊.改进的加密协议形式化验证模型和算法[J].清华大学学报(自然科学版),2002,42(1):48-51. 被引量:2

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部