期刊文献+

安全协议一阶逻辑模型中攻击重构的实现

Implementation of Attack Reconstruction in First-order Logic Model for Security Protocols
下载PDF
导出
摘要 针对安全协议一阶逻辑模型不能够给出易于理解的攻击序列的问题,对安全协议一阶逻辑模型进行扩展,对逻辑推理中的规则及合一化操作进行分类,给出操作置换规则,在此基础上开发能对攻击进行重构的协议验证原型系统。通过具体的应用例子对其秘密性进行形式化验证,结果表明系统能给出易于理解的攻击序列。 According to the problem that first-order logic model for security protocols can not give the understandable attack sequence, this paper introduces an improved model, which classifies the rules and unify operations, presents operation replacement rules, and develops a new system that can reconstruct attack sequence. Example with the simplified Needham-Schroeder protocol shows the effectiveness of the system.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第5期171-174,共4页 Computer Engineering
关键词 攻击序列重构 安全协议 一阶逻辑模型 reconstruction of attack sequence security protocols first-order logic model
  • 相关文献

参考文献4

  • 1Blanchet B. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules[C]//Proc. of the 14th IEEE Computer Security Foundations Workshop. Cape Breton, Nova Scotia, Canada: IEEE Press, 2001.
  • 2Abadi M, Blanchet B. Analyzing Security Protocols with Secrecy Types and Logic Prograrns[C]//Proc. of the 29th ACM SIGPLANSIGACT Syrup. on Principles of Programming Languages. [S. l.]: ACM Press, 2002.
  • 3李梦君,李舟军,陈火旺.SPVT:一个有效的安全协议验证工具[J].软件学报,2006,17(4):898-906. 被引量:18
  • 4Dolev D, Yao Andrew Chi-Chih. On the Security of Public-key Protocols[J]. IEEE Trans. on Information Theory, 1983, 29(2): 198-208.

二级参考文献4

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部