期刊文献+

一个端对端安全协议的缺陷分析

Security analysis of station-to-station security protocol
下载PDF
导出
摘要 针对串空间理论的不足,在相关研究的基础上,加入了Diffie-Hellman操作的密码原语,扩展了理想和诚实的概念,拓展了串空间理论的分析范围。分析了一个端对端安全协议的核心安全特性,即保密性和认证特性,使用扩展的串空间理论分析得出该协议不能满足认证性,给出该协议的一个攻击和改进方法。 This paper added Diffie-Hellman cryptographic primitives into strand space aim at the weak of the strand space.Extended the honest and ideals concepts of the strand space,which extended the scope of the strand space.Analyzed the core security property of a station to station protocol,confidentiality and authentication.Used the extended strand space to analysis the protocol and deduced this protocol could not meet the authentication property.Descripted an attack and an improvement of this protocol.
出处 《计算机应用研究》 CSCD 北大核心 2009年第12期4793-4796,共4页 Application Research of Computers
关键词 串空间 DIFFIE-HELLMAN密钥交换 数字签名 理想 strand space Diffie-Hellman key exchange digital signature ideal
  • 相关文献

参考文献9

  • 1THAYER F,HERZOG J C, GUTTMAN J D. Strand space:Why is a security protocol correct [ C ]//Proc of IEEE Symposium on Security and Privacy. Los Alamitos :IEEE Computer Society Press,1998:161-171.
  • 2THAYER F, HERZOG J C, GUTTMAN J D. Strand spaces: proving security protocols correct[ J ]. Journal of Computer Security, 1999, 7(2/3) :191-230.
  • 3SONG D. Athena:a new efficent automatic checker for security protocol analysis[ C ]// Proc of the 12th IEEE Computer Security Foundations Workshop, Los Alamitos: IEEE Computer Society Press, 1999: 178-194.
  • 4SONG D, BEREZIN S, PERRIG A. Athena: a novel approach to efficient automatic security protocol analysis[ J]. Journal of Computer Security,2001, 9( 1 ) :47-74.
  • 5THAYER F, HERZOG J C, GUTTMAN J D. Honest ideals on strand space [ C ]// Proc of the 11th IEEE Computer Security Foundations Workshop. Los Alamitos : IEEE Computer Society Press, 1998:66- 77.
  • 6沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16
  • 7HERZOG J C. The Diffie-Hellman Key-agreement scheme in the strand-space model [ C ]//Proc of IEEE Computer Security Foundations Workshop. Pacific Grove, California: IEEE Computer Society Press, 2003:234-248.
  • 8DIFFIE W, VAN OORSCHOT P C, WIENER M J. Authentication and authenticated key exchanges[ J]. Designs, Code and Croptography, 1992, 2 ( 2 ) : 107-125.
  • 9LOWE G. Some new attacks upon security protocol[ C]//Proc of the 9th IEEE Security Foundations Workshop. Los Alamitos:IEEE Computer Society Press, 1996: 162-169.

二级参考文献11

  • 1Fábrega FJT, Herzog JC, Guttman JD. Strand spaces: Proving security protocols correct. Journal of Computer Security, 1999,7(10):191-230.
  • 2Fábrega FJT, Herzog JC, Guttman JD. Authentication tests. In: Titsworth FM, ed. Proc. of the 2000 IEEE Symp. on Security and Privacy (S&P 2000). Los Alamitos: IEEE Computer Society Press, 2000. 96-109.
  • 3Fábrega FJT, Herzog JC, Guttman JD. Mixed strand spaces. In: Guttman J, ed. Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999.72-82.
  • 4Dolev D, Yao A. On the security of public-key protocols. IEEE Trans. on Information Theory, 1983,29(2):198-208.
  • 5Maneki AP. Honest functions and their application to the analysis of cryptographic protocols. In: Guttman J, ed. Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 83-89.
  • 6Anderson R, Needham R. Robustness principles for public key protocols. In: Coppersmith D, ed. Proc. of the Int'l Conf. on Advances in Cryptology (CRYPTO'95). London: Springer-Verlag, 1995. 236-247.
  • 7Harkins D, Kaufman C, Kent S, Kivinen T, Perlman R. Internet key exchange (IKEv2) protocol. 2003. http:∥www.ietf.cnri.reston.va.us/internet-drafts/draft-ietf-ipsec-ikev2-11 .txt.
  • 8Aiello W, Bellovin SM. Efficient, DOS resistant, secure key exchange for Internet protocols. In: Atluri V, ed. Proc. of the ACM Computer and Communications Security (CCS) Conf. New York: ACM Press, 2002.48-58.
  • 9Fábrega FJT, Herzog JC, Guttman JD. Protocol independence through disjoint encryption. In: Lee S, ed. Proc. of the 13th IEEE Computer Security Foundations Workshop (CSFW-13). Los Alamitos: IEEE Computer Society Press, 2000. 24-34.
  • 10Fábrega FJT, Herzog JC, Guttman JD. Honest ideals on strand spaces. In: Werner B, ed. Proc. of the 11th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1998.66-77.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部