期刊文献+

针对猜测攻击的Athena方法的扩展

Extensions to Athena for Analyzing Guessing Attack
下载PDF
导出
摘要 猜测攻击是安全协议中一类特殊问题,对其进行研究具有现实意义。本文针对猜测攻击,引入了基于串空间模型的Athena分析方法,并考虑了攻击者对弱口令的猜测能力。为此,在串空间模型的消息项中引入了可验证项的概念,以描述猜测攻击条件中的验证项,同时扩展了串空间中攻击者的能力,赋予了攻击者对弱口令的猜测能力;为在Athena后继函数搜索算法中实现对验证项的关联,以判断猜测攻击,在Athena方法的状态表示法中引入猜测验证目标及猜测验证目标绑定的概念,对状态、推理规则进行相应的修改,同时扩展后继状态函数,使扩展后的函数具备分析猜测攻击的能力;最后运用扩展后的Athena方法对会话密钥建立协议(key-establishment protocol)进行分析。分析发现,当pk为对称密钥时,协议存在猜测攻击,并给出了攻击路径。 In this paper we extend Athena approach based on strand space, considering the intruder's guessing poorlychosen password ability for analyzing guessing attack automatically and efficiently. Firstly, we present a new notion and its expression of verifiable term to describe the conditions of guess attacks and enhance the intruder's ability in strand space to endue the intruder's guessing poorly-chosen password talent. Then, in order to relate verifiers in the search process of the next-state function of Athena, two new notions of guessing verifier goal and guessing verifier goal binding are presented. Accordingly, the state expressive way and inference rules are adapted. In addition, next-state functions is extended, so that it is able to analyse guessing attacks. Finally, we analyze the key-establishment protocol using the extended Athena approach, and find a guessing attack when pk is a symmetric key.
作者 李超 董荣胜
出处 《计算机科学》 CSCD 北大核心 2007年第12期65-67,81,共4页 Computer Science
基金 广西自然科学基金项目(编号:0542052)的资助
关键词 ATHENA 猜测攻击 串空间 弱口令 认证性 Athena, Guessing attack, Strand space, Poorly-chosen password, Authentication
  • 相关文献

参考文献9

  • 1卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:117
  • 2Gong L, Mark T, Lomas A, et al. Protecting poorly chosen secrets from guessing attacks[J]. IEEE Journal on Selected Areas in Communications, 1993,11 (5): 648-656
  • 3Steiner M, Tsudik G, Waidner M. Refinement and extension of encrypted key exchange [J]. ACM Operating Systems Review, 1995,29(3):24-29
  • 4Ding Y, Horster P. Undetectable on-line password guessing attacks[J]. ACM Operating Systems Review, 2000,34 (4) : 12-20
  • 5Halevi S, Krawczyk H. Public-key cryptography and password protocols[A]. In: ACM Transaction on Information and System Security[C]. New York, USA, ACMPress, 1999,23:230-268
  • 6Lowe G. Analysing protocols subject to guessing attacks[A]. In: Workshop on Issues in the Theory of Security WITS'02[C], January 2002
  • 7Thayer F J, Herzog J C,Guttman J D. Strand spaces: Why is a security protocol correct? In: Proceedings of 1998 IEEE Symposium on Security and Privacy[C], 1998. 160-171
  • 8Song D, Perrig A, Berezin S. Athena: a novel approach to efficient automatic security protocol analysis[J]. Journal of Computer Security, 2001,9(1-2): 47-74
  • 9吴光伟,董荣胜.基于串空间的Athena分析技术研究[J].计算机科学,2006,33(8):9-13. 被引量:3

二级参考文献15

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2Thayer F J, Herzog J C, Guttman J D. Strand spaces: Why is a security protocol correct? In: Proc. of 1998 IEEE Symposium on Security and Privacy, 1998
  • 3Guttman J D, F'abrega F J T. Authentication tests. In.. Proc.2000 IEEE Symposium on Security and Privacy. May, IEEE Computer Society Press, 2000
  • 4Song A P D, Berezin S. Athena: a novel approach to effcient automatic security protocol, analysis. Journal of Computer Security,2001(9) :47-74
  • 5http://www. sergeyberezin. com/publications, php
  • 6Needham R, Sehroeder M. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM,1978
  • 7http://www. ics. uci. edu/~isse/index, html
  • 8Perrig A,SOng D X. Looking for diamonds in the desert: Extending automatic protocol generation to three party authentication and key agreement protocols. In:Proc. of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, July 2000
  • 9Berezin S. Model Checking and Theorem Proving: a Unified Framework:[PhD thesis]. Carnegie Mellon University, 2002
  • 10http://www. cag. csail. mit. edu/~kostas/dpls/athena/

共引文献118

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部