期刊文献+

密码协议分析的信任多集方法 被引量:5

Belief Multiset Formalism for Cryptographic Protocol Analysis
下载PDF
导出
摘要 提出了一种基于逻辑的信任多集方法,它与已有的密码协议安全性分析方法本质上不同:每个参与主体建立的新信任只应依赖于该主体已拥有的信任和接收或发送的包含了信任的新鲜性标识符的消息本身.在基于匹配对话和不可区分性的计算模型下,证明了给出的保证密码协议单方认证安全、双方认证安全、单方密钥安全和双方密钥安全的充分必要条件分别满足4个可证安全定义.实例研究和对比分析表明,信任多集方法有以下特点:首先,安全性分析结果要么证明了一个密码协议是安全的,要么指出了密码协议安全属性的缺失,由安全属性的缺失能够直接导出构造攻击的结构;其次,分析方法与密码协议和攻击者能力的具体形式化描述无关;最后,不仅可用于手工分析,而且便于开发出自动验证系统. This paper proposes a belief multisets formalism for analyzing cryptographic protocols, and the formalism is foundationally different from the previous: a participant's beliefs should depend only on the sent or received fresh messages and the beliefs already possessed by this party. The presented security adequacy of unilateral authentication secure, mutual authentication secure, unilateral session key secure, or mutual session key secure is proved not only substantial but also necessary to meet 4 security definitions respectively under the computational model of matching conversation and indistinguishability. Illustrations and comparison show that the analysis results based on the belief multisets suggest the correctness of a protocol or the way to construct attacks intuitively from the absence of security properties. The formalism is independent of the concrete formalization of a protocol or attackers' possible behaviors. The formalism can be developed not only by hand but also by automation.
出处 《软件学报》 EI CSCD 北大核心 2009年第11期3060-3076,共17页 Journal of Software
基金 国家自然科学基金No.90704004 国家高技术研究发展计划(863)Nos.2006AA01Z422 2009AA01Z418~~
关键词 密码协议 安全性分析 形式化方法 自动化 cryptographic protocol security analysis formalism automation
  • 相关文献

参考文献10

  • 1Lowe G.An attack on the needham-schroeder public key authentication protocol[].Information Processing Letters.1995
  • 2Lowe G.Towards a completeness result for model checking of security protocols[].Journal of Computer Security.1999
  • 3Denning D,Sacco G.Timestamps in key distribution protocols[].Communications of the ACM.1978
  • 4.Wireless LAN medium access control (MAC)and physical layer (PHY)specifications:medium access control (MAC)security enhancements[].IEEE Stdi.2004
  • 5Abadi M,Needham R.Prudent engineering practice for cryptographic protocols[].IEEE Transactions on Software Engineering.1996
  • 6Needham R,Schroeder M.Using encryption for authentication in large networks of computers[].Communications of the ACM.1978
  • 7Burrows M,Abadi M,Needham R M.A Logic of Cryptographic[].ACM Transactions on Computer Systems.1990
  • 8Goldwasser S,Micali S.Probabilistic Encryption[].Journal of Computer and System Sciences.1984
  • 9Bellare M,Rogaway P.Random oracles are practical: a paradigm for designing efficient protocols[].Proceedings of first ACM conference on Computer and Communications Security.1993
  • 10Lowe G.Breaking and Fixing the Needham-Schroeder Public-key Protocol Using FDR[].Proceedings of the nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems.1996

同被引文献57

  • 1张畅,王亚弟,韩继红,郭渊博.一种改进的密码协议形式化模型[J].软件学报,2007,18(7):1746-1755. 被引量:3
  • 2Needham R M, Schroeder M D. Using encryption for authentication in large network of computers. Communication of the ACM, 1978, 21(12) : 993-999.
  • 3Lowe G. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 1995, 56(3): 131-133.
  • 4Dolev D, Yao A C. On the security of public key protocols. IEEE Transactions on Information Theory, 1983, 29(2) : 198-208.
  • 5Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990, 8(1) : 18-36.
  • 6Gong L, Needham R, Yahalom R. Reasoning about belief in crypto-graphic protocols. Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, 1990:234-248.
  • 7Syverson P, Van Oorschot P. On unifying some cryptographic protocol logics. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, 1994 : 14-28.
  • 8ISO. ISO/IEC 2nd DIS 11770-3: key management- Part 3: mechanisms using asymmetric techniques. Geneva : International Organization for Standardization, 1997.
  • 9Mitchell C J, Yeun C Y. Fixing a problem in the Helsinki protocol. ACM Operating Systems Review, 1998, 32(4): 21-24.
  • 10Burrows M, Abadi M, Needham R M. A logic of authentication [ R/OL ]. ( 1989- 02 ) [ 2010- 01- 08 ]. http: //www. hpl. hp. eom/techreports/compaq-DEC/ SRC-RR-39. pdf.

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部