期刊文献+

状态绑定的安全协议消息块设计方法

Design Approach for Message Blocks of Security Protocol by Using State Binding
下载PDF
导出
摘要 研究抗攻击的安全协议设计方法是安全专家一直努力的方向,而安全协议中利用密码机制形成的消息块本身结构的构造,对于安全协议的抗攻击性起着非常重要的作用.本文在重放攻击层次基础上,通过提炼安全协议为避免各种攻击应具备的状态参数,提出了一种基于状态绑定的安全协议消息块设计方法.该方法针对安全协议各个层次可能存在的缺陷,通过状态绑定来解决这些缺陷,可极大限度地提高安全协议抗攻击的能力. It has always been the aim of specialists to study the design approach for attack-resistant security protocols. The construction of the message block formed by means of the cryptographic scheme is very important for security protocol to resist various attacks. On the basis of the hierarchy of replay attacks, the state parameters necessary for security protocol to avoid various attacks are analyzed, and then, a building approach for the message blocks of attack-resistant security protocols is proposed based on the state-binding. Aiming at possible flaws at various attack levels, this approach can solve them by state-binding, and thus the attack-resistant ability of the security protocols is enhanced to large extent.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第12期2229-2232,共4页 Journal of Chinese Computer Systems
基金 成都市科技攻关计划项目(07GGYB050GX)资助
关键词 安全协议 抗攻击 消息块 状态绑定 security protocol) attack resistance message block: state binding
  • 相关文献

参考文献15

  • 1Bird R, Gopal I, Herzberg A, et al. Systematic design of a family of attack-resistant authentication protocols[J].IEEE J Selected Areas in Communications, 1993, 11(5) :679-693.
  • 2Woo T, Lam S. A lesson on authentication protocol design[J].Operating Systems Review, 1994, 28(3):24-37.
  • 3Gong Li, Syverson P. Fail-stop protocols: an approach to designing secure protoeols[C]. Dependable Computing for Critical Applications 5. IEEE Computer Society, 1998,79-100.
  • 4Heather J, Lowe G,Schneider S. How to prevent type flaw attacks on security protocols[C]. 13th Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 2000,255-268.
  • 5Guttman J D. Security protocol design via authentication tests [C]. 15th IEEE Computer Security Foundations Workshop (CSFW'02). Cape Breton, Canada, IEEE Computer Society Press, 2002,92-103.
  • 6Datta A, Derek A,Mitchell J C,et al. A derivation system for security protocols and its logical formalization [C]. 16th IEEE Computer Security Foundations Workshop. 2003,109-125.
  • 7Clark J, Jacob J. A survey of authentication protocol literature version 1.0[R]. Heslingtan, York: University of York, Department of Computer Science, 1997.
  • 8SPORE. Security protocols library[EB/OL].http://www.lsv.ens-cachan. fr/spore, 2005.12.2
  • 9陶宏才,何大可.基于攻击层次的重放攻击分类[J].西南交通大学学报,2007,42(3):335-339. 被引量:7
  • 10Satyanaraynan M. Integrating security in a large distributed system[J]. ACM Transactions on Computer Systems, 1989, 7 (3) :247-280.

二级参考文献13

  • 1梅其祥,何大可,郑宇.基于Pairing抗选择密文攻击的新门限密码体制[J].西南交通大学学报,2005,40(6):727-730. 被引量:1
  • 2陶宏才,何大可.Sequence Patterns of Identity Authentication Protocols[J].Journal of Southwest Jiaotong University(English Edition),2006,14(3):205-211. 被引量:2
  • 3SYVERSON P.A taxonomy of replay attacks[C]//Proceedings of the 1994 IEEE Computer Security Foundations Workshop Ⅶ.Los Alamitos:IEEE Computer Society Press,1994:187-191.
  • 4KELSEY J,SCHNEIER B,WAGNER D.Protocol interactions and the chosen protocol attack[C]//Proc.of Security Protocols-5th International Workshop,Lecture Notes in Computer Science.Berlin:Springer-Verlag,1997(1 361):91-104.
  • 5CLARK J,JACOB J.A survey of authentication protocol literature:version 1.0[EB/OL].[2002-06-06].http://www-users.cs.york.ac.uk/~jac/under the link"Security Protocols Review",November 1997.
  • 6SPORE.Security protocols library[EB/OL].[2005-12-02],http://www.lsv.ens-cachan.fr/spore.
  • 7NEEDHAM R,SCHROEDER M.Using encryption for authentication in large networks of computers[J].Communications of the ACM,1978,21(12):993-999.
  • 8DENNING D,SACCO G.Timestamps in key distribution protocols[J].Communications of the ACM,1981,24(8):533-536.
  • 9LOWE G.An attack on the Needham-Schroeder public-key authentication protocol[J].Information Processing Letters,1995,56:131-133.
  • 10BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[R].Palo Alto:Digital Systems Research Center,1989.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部