期刊文献+

Yahalom协议的分析及改进方案 被引量:2

ANALYSIS AND IMPROMENT OF YAHALOM PROTOCOL
下载PDF
导出
摘要 Yahalom协议及BAN对Yahalom协议的改进协议都存在着安全缺陷。采用串空间模型,运用"理想"和"诚实"作为工具对Yahalom协议的安全性进行了分析并找出了该协议遭受攻击的主要原因,同时提出了Yahalom协议的一种改进方案。 There exit some security flaws in both Yahalom protocol and its improved edition BAN-Yahalom protocol. By the strand spaces method and the tools of ideal and honesty ,the security of Yahalom protocol is analyzed,and the main reason for its vulnerability to security attacks is discovered. Finally, a modified Yahalom protocol is presented.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第7期266-268,共3页 Computer Applications and Software
关键词 Yahalom协议 串空间模型 理想 诚实 Yahalom protocol Strand spaces Ideal Honest
  • 相关文献

参考文献7

  • 1Burrows M, Abadi M, Needham R. A logic of authentication. Proceedings of the Royal Society of London A, 1989,426:233 -271.
  • 2Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software-Concepts and Tools ,1996,17 : 93 - 10.
  • 3Thayer F,Herzog J C,Guttman J D. Strand space:why is a security protocol correct. Proceedings of the 1998 IEEE Symposium on Security and Privacy. 1998 : 160 - 171.
  • 4Thayer F,Herzog J C, Guttman J D. Honest ideals on strand spaces. Proceedings of the 11th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press,June 1998.
  • 5Syverson P. A Taxonomy of Replay Attacks [ C ]. proceedings of 7th IEEE Computer Security Foundation Workshop, Franconia, New Hampshire. USA : IEEE Computer Society, 1994 : 187 - 191.
  • 6王贵林,卿斯汉,周展飞.认证协议的一些新攻击方法[J].软件学报,2001,12(6):907-913. 被引量:23
  • 7Thomas Y C W, Simon S L. A semantic model for authentication protocols. Proceedings of the 14th IEEE Symposium on Research in Security and Privacy. Oakland : IEEE Computer Society Press, 1993 : 178 - 194.

二级参考文献1

共引文献22

同被引文献12

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部