期刊文献+

基于串空间的Kao Chow加密协议形式化验证 被引量:1

Formal verification of Kao Chow cryptographic protocol based on strand space model
下载PDF
导出
摘要 Kao Chow加密协议是由Kao和Chow提出的,他们利用BAN逻辑证明了该协议的认证性,但没有证明该协议的保密性,而且没有说明协议参与实体间得到的新会话密钥是否一致.事实上,由于BAN逻辑自身的缺陷,它无法用于证明加密协议的保密性.基于此,给出了Kao Chow加密协议的串空间模型,这个模型不仅验证了该协议的认证性,还验证了它的保密性及新会话密钥的一致性. Kao and Chow proposed an efficient and secure cryptographic protocol called Kao Chow protocol. They used BAN to prove its authenticity property. However, they didn't prove its secrecy and agreement on new session keys. Due to BAN's limitations, it can not be used to analyze cryptographic protocol's secrecy property. Thus a strand space model is given on the basis of which, a rigorous proof of its secrecy and agreement on new session keys as well as its authenticity property is obtained.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2007年第12期1529-1533,共5页 JUSTC
基金 国家自然科学基金(60602016 60241004) 国家重点基础研究发展(973)计划(2003CB314801) 中国高技术研究发展(863)计划(2007AA01Z428) 华为基金(YJCB2006044TS)资助
关键词 串空间 Kao Chow加密协议 协议正确性证明 strand spaces Kao Chow cryptographic protocol protocol correctness proof
  • 相关文献

参考文献10

  • 1赵保华,陈波,陆超.概率信息流安全属性分析[J].计算机学报,2006,29(8):1447-1452. 被引量:6
  • 2赵保华,陈波,陆超.动态环境中的概率信息流安全[J].西安交通大学学报,2006,40(8):874-877. 被引量:2
  • 3Fabrega F J T, Herzog J C, Guttman J D. Strand spaces: why is a security protocol correct? [C]//Proceedings of 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998: 160-171.
  • 4Dolev D, Yao A. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198-208.
  • 5Kao I L, Chow R. An efficient and secure authentication protocol using uncertified keys [J]. Operating Systems Review, 1995, 29(3) : 14-21.
  • 6Fabrega F J T, Herzog J C, Guttman J D. Strand spaces: proving security protocols correct[J]. Journal of Computer Security, 1999, 7(2-3): 191-230.
  • 7Guttman J D, Fabrega F J T. Authentication tests[C]// Proceedings of 2000 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2000: 96-109.
  • 8Meadows C. Formal methods for cryptographic protocols analysis: emerging issues and trends [J]. IEEE Journal on Selected Areas in Communications, 2003, 21(1): 44-54.
  • 9薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 10卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:118

二级参考文献17

  • 1RuiXue Deng-GuoFeng.New Semantic Model for Authentication Protocols in ASMs[J].Journal of Computer Science & Technology,2004,19(4):555-563. 被引量:5
  • 2赵保华,陈波,陆超.动态环境中的概率信息流安全[J].西安交通大学学报,2006,40(8):874-877. 被引量:2
  • 3卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 4Goguen J A,Meseguer J.Security policy and security models[C]∥ Proceedings of the 1982 Symposium on Security and Privacy.Los Alamitos,USA:IEEE Computer Society Press,1982:11-20.
  • 5Focardi R,Gorrieri R.A classification of security properties[J].Journal of Computer Security,1995,3(1):5-33.
  • 6Aldini A.Probabilistic information flow in a process algebra,UBLCS-2001-06[R].Bologna,Italy:University of Bologna,2001.
  • 7Aldini A,Bravetti M,Gorrieri R.A process-algebraic approach for the analysis of probabilistic noninterference[J].Journal of Computer Security,2004,12(2):191-245.
  • 8Aldini A,Bravetti M.An asynchronous calculus for generative-reactive probabilistic systems,UBLCS-2000-3[R].Bologna,Italy:University of Bologna,2000.
  • 9Focardi R,Rossi S.Information flow security in dynamic contexts[C]∥ Proceedings of 15th Computer Security Foundations Workshop.Los Angeles,USA:IEEE,2002:307-319.
  • 10Bossi A,Focardi R,Macedonio D,et al.A proof system for information flow security[C]∥ Proceedings of International Workshop on Logic Based Program Development and Transformation.Berlin:Springer,2002:199-218.

共引文献176

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部