期刊文献+

一类具有“开端”结构的安全协议分析方法研究

Formal Analysis Approach for a Kind of Open-ended Protocols
下载PDF
导出
摘要 开端协议(Open-ended Protocol)的分析是安全协议领域中一个待解决的重要问题,而IKE则是一个有代表性的具有"开端"结构的安全协议。本文基于串空间的Athena方法,针对IKEv2协议中的"开端"结构涉及的DH(Dif-fie-Hellman)问题,增加了群、散列函数等原语,给出并证明了一个新的消减规则;针对"开端"结构,引入了集合的数学概念,建立了新的消息类型,重新定义了串空间中的消息项、替换、入侵者模型,以及Athena相应的内在项、目标和目标绑定,给出了一个新的替代关系。应用扩展后的方法,分析了协议,发现一个新的认证性缺陷,给出了解决该缺陷的方法。 The formal analysis of Open-ended Protocols is one of emerging areas of research. The IKEv2 protocol offers a complex example. Our work is based on Athena which is an efficient automatic checking approach. We introduce set theory to deal with Open-ended structure. The new notion of message terms, substitution and the penetrator model are given and the relevant propositions or theorem such as interm relation, goal and goal-binding are therefore modified and proved. A new relation is proposed which is used in order to keep the character of Athena approach. We also introduce the ability on modeling the DH problem to Athena according to IKEv2 protocol, a new pruning theorem is given and proved. Based on the research, we analyze IKEv2 protocol, and find a new weakness of authentication. An amendment is given.
出处 《计算机科学》 CSCD 北大核心 2008年第7期45-49,共5页 Computer Science
基金 国家自然科学基金(60763004) 广西自然科学基金项目(0542052)的资助
关键词 开端协议 DIFFIE-HELLMAN SECURITY ASSOCIATION 串空间 ATHENA Open-ended protocol, Diffie-hellman, Security association, Strand spaces, Athena
  • 相关文献

参考文献9

  • 1Meadows C. Formal methods for cryptographic protocol analysis : Emerging issues and trends. IEEE Journal on Selected Areas in Communication, 2003,21 (1) : 44-54.
  • 2Bella G, Massacci F, Paulson L C, et al. Formal verification of cardholder registration in SET//Cuppens F, eds. Computer Security-GSORICS 2000. Springer LNCS 1895,2000 : 159-174.
  • 3Bryans J, Schneider S. CBS, PVS, and a recursive authentication- protocol,//Proceedings of the DIMACS Worksho Pon Design and Formal Verification of Security Protocols. 1997:3-5.
  • 4Zhou J. Fixing a security flaw in IKE protocols. Electronics Letters, 1999,35 (13) : 1072-1073.
  • 5Ferguson N, Schneier B. A security evaluation of IPSecffBlaze M, Ioannides J, Keromytis A, et al, eds. The IPSec Papers. Addison-Wesley, to appear.
  • 6Kaufman C. Internet Key Exchange (IKEv2) Protocol. Intemet Draft. http://www. ietf. org/intemet-drafts /draft-ietf-ipsecikev2-11. txt.
  • 7Boneh D. The decision Diffie-Hellman problemffProceedings of the Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science. Springer-Verlag, 1998:48-63.
  • 8Perrig A,Song D,Berezin S. Athena:a novel approach to effcient automatic security protocol, analysis. Journal of Computer Security, 2001,9(1/2) :47-74.
  • 9Thayer F J, Herzog J C, Guttman J D. Strand spaces:Why isa security protocol correct// Proceedings of 1998 IEEE Symposium on Security and Privacy. 1998:160-171.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部