期刊文献+

基于广义串空间模型构造攻击的缺陷及改进 被引量:1

Flaws and Improvement on Constructing Attack Based on Generalized Strand Space Model
下载PDF
导出
摘要 该文设计一个类似于Millen曾经构造的“ffgg”协议——“ffgg^★”协议,它们有共同的密码学性质。使用基于广义串空间模型的构造攻击对该协议进行分析,结果表明协议在非类型缺陷攻击下是安全的,这与Millen用Pulson的归纳法分析“ffgg”协议有相同的结果,并指出该方法是有缺陷的。针对这个缺陷,给出改进的措施,改进的构造攻击能发现“ffgg^★”协议中的类型缺陷攻击。 This paper designs "ffgg^★" protocol which is similar to "ffgg" protocol constructed by Millen.They have cryptographic properties in commen. Then,the protocol is analyzed by using constructing attack based on generalized strand space model ,and it is proved that the protocol is secure under non-type-flaw attacks .After "ffgg" protocol is analyzed by Millen using Pulsons inductive approach,it is secure under non-type-flaw attacks,either. It is indicated that constructing attack has limitation. Finally, some improved measures are put forward,and type-flaw attack is found by using amendatory constructing attack in "ffgg^★" protocol.
出处 《电子与信息学报》 EI CSCD 北大核心 2007年第10期2451-2454,共4页 Journal of Electronics & Information Technology
关键词 构造攻击 广义串空间模型 “ffgg”协议 Constructing attack Generalized strand space model "ffgg" protocol
  • 相关文献

参考文献7

  • 1季庆光.广义StrandSpace理论及其应用.信息安全国家重点实验室安全协议研讨会文集,2004年10月:179-201.LOIS.http://www.is.ac.cn
  • 2Ji Qingguang, Qing Sihan, Zhou Yongbin, and Feng Dengguo. Study on strand space model theory. J. Comput, Sci. & Technol, 2003, 18(5): 553-570.
  • 3Paulson L C. Proving properties of security protocols by induction.in 10th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 1997: 70-83.
  • 4Millen J K. A necessarily parallel attack, In FLoC Workshop on Formal Methods and Security Protocols, 1999, http: //citeseer. ist. psu. edu/millen99necessarily. html
  • 5Lowe G. A hierarchy of authentication specifications,In Proc.The 10th Computer Security Foundation Workshop, Rockport, Massachusetts, USA, 1997: 31-43.
  • 6Dolev D and YaoA. On the security of public key protocols. IEEE Trans. on Information Theory, 1983, 29(2): 198-208.
  • 7Fabrega F J T, Herzog. J C, and Guttman J D. Strand space: Proving security protocols correct. Journal of Computer Security,1999, 7(2/3): 191-230.

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部