期刊文献+

Yahalom-Paulson协议的串空间模型与分析 被引量:4

Strand space model of Yahalom-Paulson protocol and its analysis
下载PDF
导出
摘要 串空间模型是一种新兴的密码协议形式化分析工具,其理论中理想和诚实概念的提出大大减少了协议的证明步骤。首次利用串空间理论从机密性和认证性两个方面对Yahalom-Paulson协议进行了分析。分析结果证明该协议是安全的。 Strand spaces model is a new formal analysis tool to the analysis of cryptographic protocols.Furthermore,the proposition of the two concepts of ideal and honest simplifies the process of verification of cryptographic protocols.For the first time, based on the theory of strand space, Yahalom-Paulson protocol is analyzed from the aspects of both confidentiality and authentication.The analysis proves the correctness of the protocol.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第22期97-99,103,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.69873040~~
关键词 密码协议 Yahalom—Paulson协议 串空间 理想 cryptographic protocol Yahalom-Paulson protocol strand space ideal
  • 相关文献

参考文献10

  • 1Thayer F J,Herzog J C,Guttman J D.Strand spaces:why is a security protocol correct[C]//Proceedings of the 1998 IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society Press, 1998: 160-171.
  • 2Thayer F J,Herzog J C,Guttman J D.Strand spaces:proving security protocols correct[J].Journal of Computer Security, 1999,7 (2/3): 191-230.
  • 3Thayer F J,Herzog J C,Guttman J D.Strand spaces:honest ideals on strand spaces[C]//Proceedings of the 1998 IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press, 1998 : 66-77.
  • 4任侠,吕述望.Strand空间中基于安全密钥概念的证明思路[J].通信学报,2005,26(2):29-34. 被引量:1
  • 5孙海波,林东岱,李莉.基于理想的协议安全性分析[J].软件学报,2005,16(12):2150-2156. 被引量:3
  • 6Burrows M,Abadi M,Needham R.A logic of authentication[J].ACM Transactions on Computer Systems, 1990,8( 1 ): 18-36.
  • 7Paulson L C.Relations between secrets:two formal analyses of the Yahalom protocol[J].Journal of Computer Security,2001.
  • 8Guttman J D.Key compromise,strand spaces,and the authentication tests[J].Electronic Notes in Theoretical Computer Science,2001.
  • 9蒋睿,李建华,潘理.基于Strand Space模型的CCITT X.509协议分析[J].上海交通大学学报,2004,38(z1):169-173. 被引量:4
  • 10沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16

二级参考文献34

  • 1[1]Gritzalis S, Spinellis D, Georigiadis P. Security protocols over open networks and distributed systems:formal methods for their analysis, design, and verification [J]. Computer Communications, 1999,22 (8):695-707.
  • 2[2]Burrows M, Abadi M, Needham R. A logic of authentication [J]. ACM Transactions on Computer Systems, 1990, 8(1): 18-36.
  • 3[3]FabregaF, Herzog J,Guttman J. Strand space: why is a security protocol correct [A]. Proceedings of the 1998 IEEE Symposium on Security and Privacy[C].California, USA: IEEE Computer Society Press,1998. 160-171.
  • 4[4]Fabrega F , Herzog J,Guttman J. Honest ideals on strand space [A]. Proceedings of the IEEE Computer Security Foundations Workshop XI[C]. California,USA: IEEE Computer Society Press, 1998.66- 77.
  • 5[5]Guttman J, Fabrega F. Authentication tests [A].Proceedings of the 2000 IEEE Symposium on Security and Privacy [C]. California, USA: IEEE Computer Society Press, 2000.
  • 6[6]Herzog J . The Diffie-Hellman key-agreement scheme in the strand-space model[A]. Proceedings of the 16th IEEE Computer Security Foundation Workshop[C]. California, USA: IEEE CS Press, 2003.
  • 7[7]Guttman J. Security protocol design via authentication tests [A]. Proceedings of the 15th IEEE Computer Security Foundation Workshop [C]. California, USA: IEEE Computer Society Press, 2002.
  • 8[8]CCITT X. 509. The directory - an authentication framework[S]. 1998.
  • 9[9]Fabrega F, Herzog J, Guttman J. Strand space:proving security protocols correct [J]. Journal of Computer Security,1999, 7(2/3): 191-230.
  • 10THAYER F, HERZOG J, GUTTMAN J. Strand spaces: proving security protocols correct[J]. Journal of Computer Security, 1999, 7(2, 3): 191-230.

共引文献18

同被引文献20

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部