期刊文献+

一种分析和设计认证协议的新逻辑

New Logic for Analyzing and Designing Authentication Protocol
下载PDF
导出
摘要 提出一种分析和设计认证协议的新逻辑,可以用来分析认证协议和设计认证协议。通过运用该逻辑,使认证协议的设计和分析可以在同一种逻辑中进行,也消除了用不同的方法来设计和分析认证协议的不一致性。在分析协议时,先用逻辑对协议进行形式化,再用推理规则对协议进行推理。如果不能推理出协议的最终目标,说明协议存在缺陷或者漏洞。在设计协议时,通过运用合成规则使协议设计者可用一种系统化的方法来构造满足需要的协议。用该逻辑对Needham-Schroeder私钥协议进行了分析,指出该协议不能满足协议目标,并重新设计了该协议。 This paper presents a new logic for analyzing and designing authentication protocol. The logic can be used to analyze authentication protocol and design authentication protocol. Authentication protocol analysis and design are proceeded by the logic. The logic gets rid of non-consistence in different ways to analyze and design authentication protocol. During analyzing authentication protocok authentication protocol is formalized and is reasoned by the logic, There exist bugs or leaks in authen6cation protocol if the logic can not reason the goal of authentication protocol. During designing authemication protocol, the protocol designer can use a systematic way to construct requiring protocol by synthetic rules. The paper analyzes Needham-Schroeder protocol and presents that the protocol can not reach protocol goal, and the protocol is redesigned.
作者 缪祥华
出处 《计算机工程》 CAS CSCD 北大核心 2008年第2期34-36,53,共4页 Computer Engineering
关键词 逻辑 认证协议分析 认证协议设计 logic authentication protocol analysis authentication protocol design
  • 相关文献

参考文献9

  • 1Needham R M, Schroeder M D. Ushlg Encryption for Authentication of Large Networks of Computers[J]. Communication of the ACM, 1978, 21(12): 993-999.
  • 2Denning D E, Sacco G M. Timestamps in Key Distribution Protocols[J]. Comlnunications of the ACM, 1981, 24(8): 198-208.
  • 3Dolev D, Yao A. On the Security of Public Key Protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198-208.
  • 4Burrows M, Abadi M, and Needham R. A logic of Authentication[J]. ACM Transactions on Computer Systems, 1990, 8(1): 18-36.
  • 5Heintze N, Tygar J D, A Model for Sccure Protocols and Their Colnposition[J]. IEEE Transaction on Software Engineering, 1996, 22(16): 100-112.
  • 6Li Gong, Syverson R Fail-stop Protocols: An Approach to Designing Secure Protocols[C]//Proc. of the 5th International Working Conference on Dependable Computing for Critical Applications. Santa Barbara, USA: [s. n.], 1995.
  • 7Buttyan L, Staamann S, Wilhehn U. A Simple Logic for Authentication Protocol Design[C]//Proceedings of the IEEE Computer Security Foundutions Workshop XI. [S. l.]: IEEE Press, 1998,
  • 8Rudolph C. A Formal Model for Systematic Design of Key Eslablishment Protocols[C]//Proceedings oF ACISP'98. Koyto. Japan: [s. n.], 1998.
  • 9Guttman J D, Thayer F J. Authentication Tests[C]//Proceedings of the 2000 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2000:150-164.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部