期刊文献+

串空间理论的扩展和应用

Extension and Application of Strand Space Theory
下载PDF
导出
摘要 根据安全协议分析的需要,阐述经扩展后的串空间理论,在该理论中加入Diffie-Hellman密钥交换等操作,在此基础上扩展理想和诚实的概念,使用扩展的串空间理论分析SIGMA-R协议的核心安全特性——保密性和认证特性,并通过数学方法加以验证。 Due to the requirement of the security protocol analysis, the paper presents the extended strand space theory. A new cryptographic primitive is added into strand space including Diffie-Hellman(DH) operations. On this basis, the honest and ideals concepts are extended. The core security property of the SIGMA-R protocol, confidentiality and authentication, is analyzed by using the extended strand space theory. Through the mathematic method, the two security properties are identified.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第22期137-140,共4页 Computer Engineering
关键词 串空间 DIFFIE-HELLMAN密钥交换 数字签名 strand space Diffie-Hellman(DH) key exchange digital signature
  • 相关文献

参考文献7

  • 1Thayer F. Strand Space: Why, Is a Security Protocol Correct[C]//Proc. of the IEEE Symposium on Security and Privacy. [S. l.]: IEEE Press, 1998.
  • 2Thayer F. Strand Spaces: Proving Security Protocols Correct[J]. Journal of Computer Security. 1999, 7(2/3): 191-230.
  • 3Thayer F, tferzog J C. Authentication Tests[C]//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE Press, 2000.
  • 4Guttman J D, Thayer F. Authentication Tests and the Structure of Bundles[Z]. (2003-08-12). http://www.mitre.org/work/tech papers/ tech_papers_ 01/guttman bundles/index.html.
  • 5沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16
  • 6Krawczyk H. SIGMA: The "SIGn-and-Mac" Approach to Authentication Diffie-Helhnan and Its Use in the IKE Protocols[C]// Proc. of CRYPTO'03. [S.l.]: IEEE Press, 2003.
  • 7Thayer F. Honest Ideals on Strand Space[C]//Proceedings of the 11th IEEE Computer Security Foundations Workshop. [S.l.]: IEEE Press, 1998.

二级参考文献11

  • 1Fábrega FJT, Herzog JC, Guttman JD. Strand spaces: Proving security protocols correct. Journal of Computer Security, 1999,7(10):191-230.
  • 2Fábrega FJT, Herzog JC, Guttman JD. Authentication tests. In: Titsworth FM, ed. Proc. of the 2000 IEEE Symp. on Security and Privacy (S&P 2000). Los Alamitos: IEEE Computer Society Press, 2000. 96-109.
  • 3Fábrega FJT, Herzog JC, Guttman JD. Mixed strand spaces. In: Guttman J, ed. Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999.72-82.
  • 4Dolev D, Yao A. On the security of public-key protocols. IEEE Trans. on Information Theory, 1983,29(2):198-208.
  • 5Maneki AP. Honest functions and their application to the analysis of cryptographic protocols. In: Guttman J, ed. Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 83-89.
  • 6Anderson R, Needham R. Robustness principles for public key protocols. In: Coppersmith D, ed. Proc. of the Int'l Conf. on Advances in Cryptology (CRYPTO'95). London: Springer-Verlag, 1995. 236-247.
  • 7Harkins D, Kaufman C, Kent S, Kivinen T, Perlman R. Internet key exchange (IKEv2) protocol. 2003. http:∥www.ietf.cnri.reston.va.us/internet-drafts/draft-ietf-ipsec-ikev2-11 .txt.
  • 8Aiello W, Bellovin SM. Efficient, DOS resistant, secure key exchange for Internet protocols. In: Atluri V, ed. Proc. of the ACM Computer and Communications Security (CCS) Conf. New York: ACM Press, 2002.48-58.
  • 9Fábrega FJT, Herzog JC, Guttman JD. Protocol independence through disjoint encryption. In: Lee S, ed. Proc. of the 13th IEEE Computer Security Foundations Workshop (CSFW-13). Los Alamitos: IEEE Computer Society Press, 2000. 24-34.
  • 10Fábrega FJT, Herzog JC, Guttman JD. Honest ideals on strand spaces. In: Werner B, ed. Proc. of the 11th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1998.66-77.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部