期刊文献+

认证测试方法在应用中出现的问题及改进

Improvement of Authentication Test in Application
下载PDF
导出
摘要 在应用中,当关键原子值发生多次形式转换时,需要进行多次认证测试。鉴于此,本文引入了关键分量(Key Component)的概念,提出了多重认证测试(Multiple Authentication Test)方法。使用该方法重新设计了Woo-Lam协议,通过两个"挑战-响应"回合,确保主体角色的非对称性和响应者对发起者的身份认证。设计出的Woo-Lam协议不仅避免了原协议经认证测试方法改进后存在的缺少主体标识的缺陷,而且避免了Abadi和Buttyan等人分别对原协议改进后存在的两个重放攻击。 In application, when multiple form transformations of key atomic value occur, there should be multiple authentication tests. With the conception of Key Component, a new method called Multiple Authentication Test is presented. Then the Woo-Lain protocol is redesigned and improved by this method. Through two "challenge-response" runs, the role asymmetry and identity authentication of participants are ensured, not only avoiding the flaw in the protocol improved by Authentication Test, but also avoiding two replay attacks in the protocol improved by informal principles and BSW logic.
出处 《计算机科学》 CSCD 北大核心 2007年第10期103-105,123,共4页 Computer Science
基金 本文得到广西自然科学基金项目(0542052)的资助。
关键词 认证测试 Woo-Lam协议 关键分量 多重认证测试 角色非对称性 Authentication test, Woo-Lam protocol, Key component, Multiple authentication test, Role asymmetry
  • 相关文献

参考文献9

  • 1Guttman J D, F'abrega F J T. Authentication tests[C]. In:Proceedings of the 2000 IEEE Symposium on Security and Privacy, Los Alamitos, 2000. 96-109
  • 2Guttman J D, F'abrega F J T. Authentication tests and the structure of bundles[J]. Theoretical Computer Science, 2002,283(2) : 333-380
  • 3Guttman J D. Security protocol design via authentication tests [C]. In :Proceedings of the 2002'IEEE Computer Security Foundations Workshop, Los Alamitos, 2002. 92-103
  • 4Perrig A, Song D X. Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement[C]. In : Proceedings of the 2000 IEEE Computer Security Foundations Workshop, Los Alamitos, 2000. 64-76
  • 5Choi Hyun-Jin. Security protocol design by composition [D]. Cambridge, United Kingdom: University of Cambridge, 2006
  • 6Debbabi M, Mejri M, Tawbi N, et al. A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios[C].In: DIMACS Workshop on Design and Formal Verifictaion of Security Protocols, 1997
  • 7Clark J, Jacob J. A survey of authentication protocol literature: Version 1.0[EB/OL]. http://www-users. cs. york. ac. uk/-jac/ under the link \Security Protocols Review, 1997
  • 8Abadi M, Needham R. Prudent Engineering Practice for Cryptographic Protocols[C]. In : Proceedings of the 1994 IEEE Computer Society Symposium on Security and Privacy, Los Alamitos, 1994. 122-136
  • 9Buttyan L, Staamann S, Wilhelm U. A simple logic for authentication protocol design[C]. In: Proceedings of the 1998 IEEE Computer Security Foundations Workshop, Los Alamitos, 1998. 153-162

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部