期刊文献+

安全协议的测试与证明 被引量:1

Testing and proving security protocols
下载PDF
导出
摘要 提出通过测试来证明安全协议的方法。以NS和NSL协议为例,首先将协议形式化为事件序列,协议的性质可以表示为序列上的性质。协议的完整运行可以系统地生成,因此,协议的性质可以系统地测试。形式化和测试在函数程序设计语言Haskell中完成。 It is shown how security protocols can be systematically tested,hence proved in Haskell.That is demonstrated by analyzing NS(Needham-Schroeder) and NSL(Needham-Schroeder-Lowe) protocols:runs of the protocols are formalized as event traces and properties on traces are tested.Complete runs of a protocol with a penetrator can be generated systematically,and properties of the protocol can be tested systematically.Lowe's attack is easily revealed by testing NS protocol and authentication and secrecy are proved valid for NSL protocol by testing.
作者 乔海燕
机构地区 中山大学
出处 《计算机工程与应用》 CSCD 北大核心 2009年第4期26-29,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.60673035~~
关键词 测试 Needham-Schroeder-Lowe协议 函数程序设计 testing Needham-Schroeder-Lowe(NSL) protocol functional programming
  • 相关文献

参考文献11

  • 1Javier F, Herzog J C, Guttman J D.Strand spaces : Proving security protocols correct[J].Journal of Computer Security,2001,7:191-230.
  • 2Dolev D,Yao A C.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29:198-208.
  • 3Paulson L C.The inductive approach to verifying cryptographic protocols[J].Journal of Computer Security, 1998,6 : 85-128.
  • 4Abadi M,Gordon A D.A calculus for cryptographic protocols the Spi calculus[J].Information and Computation, 1999,148( 1 ) : 1-70.
  • 5Burrows M,Abadi M,Needham R M.A logic of authentication[J]. ACM Transactions on Computer Systems, 1990,8( 1 ) : 18-36.
  • 6Sumii E,Pierce B C.Logical relations for encryption[J].Journal of Computer Security, 2003,11 (4) : 521-554.
  • 7Denker G,Meseguer J,Talcott C.Protocol specification and analysis in Maude[C]//Heintze N,Wing J.Proc of Workshop on Formal Methods and Security Protocols,Indianapolis,Indiana, 1998:939-944.
  • 8Roscoe A W.Modelling and verifying key exchange protocols using CSP and FDR[C]//Proc 8th IEEE Computer Security Foundations Workshop.[S.l.]:IEEE Computer Society Press, 1995:98-107.
  • 9Basin D.Lazy infinite-state analysis of security protocols secure networking -CQRE, [Secure]' 99. [S.l.] : Springer -Verlag, 1999,1740: 30-42.
  • 10Jones S P.Haskell 98 language and libraries.http://www.haskell. org/onlinereport/.

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部