期刊文献+

针对协议组合问题的Athena方法扩展

Extension of the approach of Athena to multi-protocol analysis
下载PDF
导出
摘要 针对安全协议形式化分析领域的五个公开问题之一的协议的组合性问题,选用并扩展了Athena分析方法,以求对组合协议进行自动分析。通过扩展了串、丛的概念以及逻辑和状态表示法,以描述多个协议的运行。考虑到从协议对主协议的影响,引入了串空间中理想的概念,给出了其自动生成算法,并扩展了后继状态函数。最后运用扩展后的Athena方法对Neuman Stubblebine协议进行了分析,发现协议部分对协议部分存在有攻击,相应给出了攻击路径。 Compositionality of security protocol is one of the five issues in security protocol formal analysis. In this paper, the novel approach of Athena in analyzing security protocol is extended for multi-protocol analysis. Firstly, in order to express the run of multi-protocol, the notions of strand and bound are developed. The logic and the state representation are extended. In response to the secondary protocol's influences on the primary protocol, we proposed the notion of strand space and its automatic constructed algorithm. In addition, the next-state function of Athena is extended. Finally, using the extended Athena approach, we found an attack from part Ⅱ to part Ⅰ when analyzing the Neuman Stubblebine protocol.
出处 《桂林电子科技大学学报》 2007年第4期274-278,共5页 Journal of Guilin University of Electronic Technology
基金 广西自然科学基金项目(0542052)
关键词 Athena方法 串空间 混合串空间 组合协议 Athena approach strand space mixed strand space multi-protocol
  • 相关文献

参考文献10

  • 1MEADOWS C.Formal methods for cryptographic protocol analysis:emerging issues and trends[J].IEEE Journal on Selected Areas in Communication,2003,21 (1):44-54.
  • 2GUTTMAN,F'ABREGA J T.Protocol independence through disjoint encryption[C]//Proceedings of the 13th Computer Security Foundations Workshop.IEEE Computer Society Press,2000:24-34.
  • 3F'ABREGA J T,HERZOG J,GUTTMAN J.Mixed strand spaces[C]//Proceedings of the IEEE 1999 Computer Security Foundations Workshop.IEEE Computer Society Press,1999:72-82.
  • 4CREMERS C J F.Feasibility of mutli-protocol attacks[C]//Proceedings of the firest international conference on availability,reliability and security[J].IEEE ComputerSociety Press,2006.
  • 5F'ABREGA J T,HERZOG J C,GUTTMAN J D.Strand spaces:proving security protocols correct[J].Journal of Computer Security,1999,9:191-230.
  • 6SONG D,PERRIG A,BEREZIN S.Athena:a novel approach to effcient automatic security protocol analysis[J].Journal of Computer Security,2001,9(1/2):47-74.
  • 7吴光伟,董荣胜.基于串空间的Athena分析技术研究[J].计算机科学,2006,33(8):9-13. 被引量:3
  • 8GONG L,SYVERSON P.Fail-stop protocols:an approach to designing secure protocols[M]//IYER R K,MORGANTI M,FUCHS W K,GLIGOR V.Dependable Computing for Critical Applications 5.IEEE Computer Society,1998:79-100.
  • 9HEINTZE N,F'ABREGA J T.A model for secure protocols and their composition[J].IEEE Transactions on Software Engineering,1996,22(1):16-30.
  • 10CANETTI R,MEADOWS C,SYVERSON P.Environmental requirements and authentication protocols[C]//Symposium on Requirements Engineering for Information Security.SpringerVerlag LNCS,2002,2609:339-355.

二级参考文献9

  • 1Thayer F J, Herzog J C, Guttman J D. Strand spaces: Why is a security protocol correct? In: Proc. of 1998 IEEE Symposium on Security and Privacy, 1998
  • 2Guttman J D, F'abrega F J T. Authentication tests. In.. Proc.2000 IEEE Symposium on Security and Privacy. May, IEEE Computer Society Press, 2000
  • 3Song A P D, Berezin S. Athena: a novel approach to effcient automatic security protocol, analysis. Journal of Computer Security,2001(9) :47-74
  • 4http://www. sergeyberezin. com/publications, php
  • 5Needham R, Sehroeder M. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM,1978
  • 6http://www. ics. uci. edu/~isse/index, html
  • 7Perrig A,SOng D X. Looking for diamonds in the desert: Extending automatic protocol generation to three party authentication and key agreement protocols. In:Proc. of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, July 2000
  • 8Berezin S. Model Checking and Theorem Proving: a Unified Framework:[PhD thesis]. Carnegie Mellon University, 2002
  • 9http://www. cag. csail. mit. edu/~kostas/dpls/athena/

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部