期刊文献+

使用组合协议逻辑PCL验证Amended Needham-Schroeder协议 被引量:1

Verification of the Amended Needham-Schroeder Protocol Using Protocol Composition Logic PCL
下载PDF
导出
摘要 安全协议的形式化分析和验证一直是信息安全领域的一个重要问题。本文介绍了组合式验证方法以及面向安全协议验证的组合式验证工具PCL,并采用PCL对Amended Needham-Schroeder协议进行了验证,证明该协议满足保密性。在验证中将完整的协议划分为三个子协议,对子协议分别做性质描述和验证,最后将三个子协议组合成完整的协议,通过三个子协议之间前置断言和后置断言的一致性,证明了组合之后的协议满足保密性。 Forraal analysis and verification is an essential problem in information security. In this paper, we introduce a compositional verification method and the tool PCL for security protocol verification. The Amended Needham-Schroeder protocol is verified via PCL and proved to satisfy secrecy property. In the verification, the whole protocol is divided into three sub-protocols, which are separately described and verified. Finally, the three separate verifications are composed according to the correspondence of their preconditions and postconditions, thus the secrecy property of the Amended Needham-Schroeder protocol is proved compositionally.
出处 《计算机工程与科学》 CSCD 2008年第11期13-15,共3页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60473057,90604007)
关键词 Floyd-Hoare逻辑 PCL 安全协议 Floyd-Hoare logic PCL security protocol
  • 相关文献

参考文献9

  • 1Clark J, Jacob J. A Survey of Authentication Protocol Literature. Version 1. 0[EB/OL]. [2007-09-12]. http://www-users. cs. york. ae. uk/-jae/papers/drareview, ps. gz.
  • 2Zhou P, Hooman J, Kuiper R. Compositional Verification of Real-Time Systems with Explicit Clock Temporal Logic [M]//Formal Aspects of Computing. Vol 8. 1996 : 294-323.
  • 3Roy A,Datta A,Derek A, et al. Secrecy Analysis in Protocol Composition Logic[C]//Proc of ASIAN'06,2006:197-213.
  • 4Floyd R W. Assigning Meaning to Programs[C]//Proc of American Mathematics Society Symp, 1967:19-31.
  • 5Hoare C A R. An Axiomatic Basis for Computer Programming[J]. Communications of the ACM, 1969, 12 (10): 576- 580.
  • 6Durgin N, Mitchell J C,Pavlovic D. A Compositional Logic for Proving Security Properties of Protocols[J]. Journal of Computer Security, 2003,11 (4): 677-721.
  • 7Datta A, Derek A, Mitchell J C, et al. Protocol Composition Logic (PCL)[M]//Electronic Notes in Theoretical Computer Science. Vol 172. 2007:311-358.
  • 8Thayer-Fabrega F J, Herzog J C, Guttman J D. Strand Spaces: Why Is a Security Protocol Correct? [C]//Proc of the 1998 IEEE Syrup on Security and Privacy, 1998:160-171.
  • 9刘锋,李舟军,李梦君,宋震,张艳.基于SMV的安全协议模型检验[J].计算机工程与科学,2004,26(2):28-31. 被引量:4

共引文献3

同被引文献13

  • 1Acs G,Buttyan L,Vajda I.Provably secure on-demandsource routing in mobile Ad Hoc networks[J].IEEE Trans.on Mobile Computing,2006,5(11):1533-1546.
  • 2Levente Buttyán,István Vajda.Towards provable securityfor ad hoc routing protocols[C]//Proceedings of the ACMWorkshop on Security in Ad Hoc and Sensor Networks,ESAS’04.ACM Press,2004:94-105.
  • 3Jens Chr Godskesen,Sebastian Nanz.Mobility models andbehavioural equivalence for wireless networks[C]//Proc.the 11th International Conference on Coordination Modelsand Languages.Springer,2009,552:106-122.
  • 4Todd R Andel.Formal security evaluation of Ad Hoc routingprotocols[D].College Of Arts and Sciences,Florid State U-niversity,2007.
  • 5Datta,A,Derek A,Mitchell J C,et al.A derivation sys-tem and compositional logic for security protocols[J].Jour-nal of Computer Security,2005,13(3):423-482.
  • 6He C,Sundararajan M,Datta A,et al.A modular correct-ness proof of IEEE 802.11i and TLS[C]//Proceedings ofthe 12th ACM Conference on Computer and Communica-tions Security.2005:2-15.
  • 7Arnab Roy,Anupam Datta,Ante Derek,et al.Secrecyanalysis in protocol composition logic[C]//Proceedings ofthe 11th Asian Computing Science Conference on Ad-vances in Computer Science:Secure Software and RelatedIssues.2006:197-213.
  • 8Pirzada A,McDonald C.Kerberos assisted authentication inmobile Ad Hoc networks[C]//Proceedings of the 27th Aus-tralasian Conference on Computer Science.2004,26:41-46.
  • 9Kohl J,Neuman S.The Kerberos Network AuthenticationService(V5)[EB/OL].http://www.ietf.org/rfc/rfc1510.txt,1993-12-10.
  • 10王惠斌,祝跃飞,常青美.协议组合逻辑系统研究[J].郑州大学学报(理学版),2008,40(4):56-59. 被引量:4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部