期刊文献+

一个双向认证协议的分析与改进

Analysis and Improvement of a Mutual Authentication Protocol
下载PDF
导出
摘要 运用安全协议形式化分析方法中的串空间模型理论,对Natalia Miloslavskaya等人提出的一个双向认证协议进行了分析,发现该协议在认证方面存在缺陷,并对该协议进行了改进,同时用串空间理论证明了改进后的协议的认证正确性。 This paper applied strand space model, which is a method for formal analysis of security protocol, to analyse a mutual authentication protocol proposed by Natalia Miloslavskaya et al. , and found some flaws of the protocol on authentication. Then an improved protocol was proposed, and its correctness on authentication was proved by using strand space model.
出处 《计算机科学》 CSCD 北大核心 2009年第2期129-131,151,共4页 Computer Science
基金 国家自然科学基金资助项目(30400446)资助
关键词 安全协议 认证 串空间 Security protocol, Authentication, Strand space
  • 相关文献

参考文献11

  • 1Burrows M, Abadi M, Needham M. A logic of authentication[J].ACM Transactions on Computer Systems, 1990,8 ( 1 ):18- 36
  • 2Kailar R. Accountability in electronic commerce protocols[J]. IEEE Transactions on Software Engineering, 1996,22 ( 5 ):313- 328
  • 3Abadi M, Gordon D. A calculus for cryptographic protocols:The spi calculus[C]//Proceedings of the Fourth ACM Conference on Computer and Communications Security. 1997
  • 4Abadi M, Gordon D. Reasoning about cryptographic protocols in the spi calculus[C]. Technical Report 414. University of Cambridge Computer Laboratory, 1997
  • 5Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR[C]//Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science. Springer-Verlag, 1996 : 147-166
  • 6Fabrega F, Herzog J,Guttman J. Strand space: why is a security protocol correct [C]// Proceedings of the 1998 IEEE Symposium on Security and Privacy. California, USA:IEEE Computer Society Press, 1998:160-171
  • 7Fabrega F, Herzog J, Guttman J. Honest ideals on strand space [C]//Proceedings of the IEEE Computer Security Foundations Workshop Ⅺ. California, USA:IEEE Computer Society Press, 1998:66-77
  • 8刘璟,祝世雄,周明天.Yahalom协议的串空间模型及分析[J].小型微型计算机系统,2006,27(5):788-792. 被引量:5
  • 9Furqan Z, Muhammad S, Guha R. Formal Verification of 802. lli using Strand Space Formalism [C]//Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies. California, USA: IEEE Computer Society Press, 2006
  • 10Miloslavskaya M , Tolstoy A , Ushakov D. Protocol of Secure Mutual Authentication [C]// Proceedings of the 2007 IEEE Workshop on Information Assurance. IEEE SMC, 2007:43-48

二级参考文献6

  • 1Thayer F J, Herzog J C, Guttman J D. Strand spaces: Why is a security protocol correct[A]. In:Proceedings of the 1998 IEEE Symposium on Security and Privacy[C]. Los Alamitos: IEEE Computer Society, 1998, 160-171.
  • 2Thayer F J, Herzog J C, Guttman J D. Strand spaces: proving security protocols correct [J]. Journal of Computer Security,1999, 7(2,3):191-230.
  • 3Thayer F J, Herzog J C, Guttman J D. Strand spaces: honest ideals on strand spaces[A]. In: Proceedings of the 1998 IEEE Computer Security Foundations IEEE Computer Society, 1998,Workshop[C]. Los Alamitos:66-77.
  • 4Song D X, June 1999. Athena: a new efficient automated checker for security protocol analysis[A]. In:Proceedings of the 12th IEEE Computer Security Foundations Workshop [C]. IEEE Computer Society Press.
  • 5Gavin Lowe. Towards a completeness result for model checking of security protocols [R]. Technical Report 1998/6, Dept. of Mathematics and Computer Science, University of Leicester,1998.
  • 6Javier F. Thayer F-abrega, Jonathan C. Herzog, Joshua D.Guttman. Mixing protocols [A]. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop [C]. IEEE Computer Society, June 1999.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部