期刊文献+

串空间模型及其认证测试方法的一种扩展与应用 被引量:2

Improvement of authentication test based on strand spaces model
下载PDF
导出
摘要 认证测试方法是基于串空间模型的验证安全协议的一种形式化方法,由于串空间模型没有抽象更多的密码学原语,因此难以分析较复杂的安全协议。通过扩展消息项、子项关系以及入侵者模型,扩展了串空间模型及相应的认证测试方法。根据扩展后的认证测试方法,分析了SSL3.0握手协议,验证了该协议认证属性。 Authentication test is a formal method of verifying the security protocols based on strand space model. However, it hardly analyzes some complex security protocols on account of its poor cryptographic primitives. Theory of Strand spaces model and corresponding authentication test were extended by extending the message term, the in-term relation and penetrator's model. SSL3. 0 handshaking protocols were analyzed with the proposed approach, and the properties of authentication were verified.
出处 《计算机应用》 CSCD 北大核心 2008年第12期3205-3207,3210,共4页 journal of Computer Applications
基金 江苏省高校自然科学研究项目(08KJB520010) 重庆市自然科学基金项目(2006BB2259)
关键词 串空间模型 认证测试SSL3.0握手协议 认证属性 密码学原语 strand spaces model authentication test SSL3. 0 handshaking protocol property of authentication cryptographic primitives
  • 相关文献

参考文献6

  • 1FABREGA F J T, HERZOG J C, GUTTMAN J D. Strand space: Why is a security protocol correct? [ C] //Proceedings of the 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998:160 - 171.
  • 2HEATHER J, LOWE G, SCHNEIDER S. How to prevent type flaw attacks on security protocols [ J]. Journal of computer Security, 2003, 11(2) : 217-244.
  • 3CALEIRO C, VIGANO L, BASIN D. Relating strand spaces and distributed temporal logic for security protocol analysis[ J]. Logic Journal of the IGPL, 2005, 13(6) : 637 -664.
  • 4GUTTMAN J D, FABREGA F J T. Authentication tests [ C]//Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society Press, 2000:96 - 109.
  • 5FABREGA F J T, HERZOG J C, GUTTMAN J D. Strand spaces Proving security protocols correct [J]. Journal of Computer Security, 1999,7(2/3): 191 -230.
  • 6沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16

二级参考文献11

  • 1Fábrega FJT, Herzog JC, Guttman JD. Strand spaces: Proving security protocols correct. Journal of Computer Security, 1999,7(10):191-230.
  • 2Fábrega FJT, Herzog JC, Guttman JD. Authentication tests. In: Titsworth FM, ed. Proc. of the 2000 IEEE Symp. on Security and Privacy (S&P 2000). Los Alamitos: IEEE Computer Society Press, 2000. 96-109.
  • 3Fábrega FJT, Herzog JC, Guttman JD. Mixed strand spaces. In: Guttman J, ed. Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999.72-82.
  • 4Dolev D, Yao A. On the security of public-key protocols. IEEE Trans. on Information Theory, 1983,29(2):198-208.
  • 5Maneki AP. Honest functions and their application to the analysis of cryptographic protocols. In: Guttman J, ed. Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 83-89.
  • 6Anderson R, Needham R. Robustness principles for public key protocols. In: Coppersmith D, ed. Proc. of the Int'l Conf. on Advances in Cryptology (CRYPTO'95). London: Springer-Verlag, 1995. 236-247.
  • 7Harkins D, Kaufman C, Kent S, Kivinen T, Perlman R. Internet key exchange (IKEv2) protocol. 2003. http:∥www.ietf.cnri.reston.va.us/internet-drafts/draft-ietf-ipsec-ikev2-11 .txt.
  • 8Aiello W, Bellovin SM. Efficient, DOS resistant, secure key exchange for Internet protocols. In: Atluri V, ed. Proc. of the ACM Computer and Communications Security (CCS) Conf. New York: ACM Press, 2002.48-58.
  • 9Fábrega FJT, Herzog JC, Guttman JD. Protocol independence through disjoint encryption. In: Lee S, ed. Proc. of the 13th IEEE Computer Security Foundations Workshop (CSFW-13). Los Alamitos: IEEE Computer Society Press, 2000. 24-34.
  • 10Fábrega FJT, Herzog JC, Guttman JD. Honest ideals on strand spaces. In: Werner B, ed. Proc. of the 11th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1998.66-77.

共引文献15

同被引文献34

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部