期刊文献+

基于GSPM的安全协议检验工具 被引量:1

Verification Tool for Security Protocol Based on GSPM
下载PDF
导出
摘要 介绍一个基于GSPM的安全协议验证的图形化工具。验证工具以GSPM模型为基础形式化地描述了安全协议,并引进线性时序逻辑刻画了安全协议的性质,用基于状态搜索的模型检测方法在安全协议的验证过程中找出漏洞。以简化的NSPK协议为例,描述了该工具如何验证安全协议,表明GSPM模型和验证算法的有效性和正确性。 This paper describes a graphic verification tool for security protocol based on GSPM with formal methods. Linear Temporal Logic(LTL) is introduced to show the property of security protocol. This tool can find out the bug of security protocol using the model-checking method based on searching states. The simplified needham-schroeder public-key authentication protocol is used to exemplify the automatic verification process of security protocol with this tool, and results show the validity and correctness of the verification algorithm.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第17期130-132,共3页 Computer Engineering
基金 国家"973"计划基金资助项目(2003CB317005) 国家自然科学基金资助项目(60473006 60573002) 博士点基金资助项目(20010248033)
关键词 线性时序逻辑 安全协议 保密性 认证性 Linear Temporal Logic(LTL) security protocol confidentiality authentication
  • 相关文献

参考文献3

  • 1顾永跟,傅育熙,朱涵.基于可达关系的安全协议保密性分析[J].计算机学报,2007,30(2):255-261. 被引量:4
  • 2Debbabi M, Mejri M, Tawbi N, et al. A New Algorithm for the Automatic Verification of Authentication Protocols: From Specifications to Flaws and Attack Scenarios[C]//Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols. New Jersey, USA: [s. n.], 1997.
  • 3Dolev D, Yao A. On the Security of Public Key Protocols[J]. IEEE Trans. on Information Theory, 1983, 29(2): 198-208.

二级参考文献12

  • 1李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 2薛锐.安全协议的形式化分析技术和方法.安全协议研讨会,北京,2004.
  • 3Meadows C.Formal methods for cryptographic protocol analysis:Emerging issues and trends.IEEE Journal on Selected Areas in Communications,2003,21(1):44-54
  • 4Ryan P Y A,Schneider S A,Goldsmith M H,Lowe G,Roscoe A W.The Modeling and Analysis of Security Protocols:The CSP Approach.Londdon,England:Pearson,2001
  • 5Abadi M,Gordon A D.A calculus for cryptographic protocols:The spi calculus//Proceedings of the 4th ACM Conference on Computer and Communications Security.Zurich,Switzerland,1997:36-47
  • 6Boreale M,Buscemi M G.A framework for the analysis of security protocols//Proceedings of the 13th International Conference on Concurrency Theory,Lecture Notes in Computer Science 2421.London,UK:Springer-Verlag,2002:483-498
  • 7Abadi M.Security protocols and specifications//Proceedings of the 2nd International Conference on Foundations & of Software Science and Computation Structure,Lecture Notes in Computer Science 1578.London,UK:Springer-Verlag,1999:1-13
  • 8Dolev D,Yao A.On the security of public key protocols.IEEE Transactions on Information Theory,1983,29(2):198-208
  • 9Clarke M,Grumberg O,Peled D.Model Checking.USA:Mit Press,2000
  • 10Tatehayashi M,Matsuzaki N,Newman D.Key distribution protocol for digital mobile communication systems//Proceedings of the Advances in Cryptology.NY,USA:Springer-Verlag,1989:324-334

共引文献3

同被引文献7

  • 1苏开乐,吕关锋,陈清亮.基于知识结构的认证协议验证[J].中国科学(E辑),2005,35(4):337-351. 被引量:7
  • 2李梦君,李舟军,陈火旺.SPVT:一个有效的安全协议验证工具[J].软件学报,2006,17(4):898-906. 被引量:18
  • 3MONT M C, HARRISION K, SADLER M. The HP time vault service: exploiting IBE for timed release of confidential information [C]// Proceedings of the 12th international conference on World Wide Web. Budapest: ACM Press, 2003:160 - 169.
  • 4RIVEST R L, SHAMIR A, WAGNER D A. Time-lock puzzles and timed-release cryptographic protocol [ R]. Cambridge: MIT Laboratory for Computer Science, 1996.
  • 5HOARE C. Communicating sequential processes [ J]. Communications of ACM, 1978, 21(8) : 666 -677.
  • 6LEI XIN-FENG, LIU JUN, XIAO JUN-MO. A logic to model time in cryptographic protocols [ C]// 2008 International Symposium on Computer Seienee and Computational Technology. Los Alamitos: IEEE Computer Society, 2008:399 -403.
  • 7DOJEN R, COFFEYA T. A novel approach to efficient automatic security protocol analysis [ J]. ACM Transactions on Information and System, 2005, 8(3): 287-311.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部