期刊文献+

可信密码模块的模型检测分析 被引量:3

Model checking of trusted cryptographic module
下载PDF
导出
摘要 根据可信密码模块规范的非形式化描述,利用模型检测工具SPIN对可信密码模块安全性进行形式化分析,给出了可信密码模块形式化分析的基本框架,重点分析了AP授权协议和可信密码模块初始化子系统。指出了AP授权协议存在的缺陷,并给出了具体的改进措施;同时验证可信密码模块初始化子系统状态的一致性。 The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given. Meanwhile, the framework was proposed for analyzing the security property of the trusted cryptographic module using the model checking tools .
出处 《通信学报》 EI CSCD 北大核心 2010年第1期59-64,72,共7页 Journal on Communications
基金 国家自然科学基金资助项目(60673083 60603017) 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB311202)~~
关键词 可信计算平台 可信密码模块 模型检测 trusted computing platform trusted cryptographic module model checking
  • 相关文献

参考文献12

  • 1Trusted computing group(EB/OL], http://www.trustedcomputinggroup. org.
  • 2BARRETT M. Towards an open trusted computing framework[A]. MSc Thesis[C]. 2005.
  • 3BRUSCHI D, CAVALLARO L, LANZI A, et al. Replay attack in TCG specification and solution[A]. 21th Annual Computer Security Application Conference (ACSAC)[C]. Tucson, AZ, USA, 2005.
  • 4YOUN E The Analysis of Cryptographic APIs Using the Theorem Prover Otter[M]. MIT Press, 2004.
  • 5KURSAWE K, SCHELLEKENS D, PRENEEL B. Analyzing trusted platform communication[A]. CRASH Workshop: CRyptographic Advances in Secure Hardware[C]. 2005.
  • 6KAUER B. OSLO: Improving the security of Trusted Computing[R]. Technical Report, Technische Universitt Dresden, Department of Computer Science, 2007.
  • 7KOCHER P C, JAFFE J, JUN B. Differential power analysis[A].CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology[C]. London, UK, Springer-Verlag, 1999. 388-397.
  • 8KOCHER P C. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[A]. CRYPTO'96: Proceedings of the 16thArmual International Cryptology Conference on Advances in Cryptology[C]. London, UK, Springer-Verlag, 1996. 104-113.
  • 9BONEH D, BRUMLEY D. Remote timing attacks are practical[A]. Proceedings of the 12th USENIX Security Symposium[C]. 2003.
  • 10JOSANG A. Security protocol verification using SPIN[A]. SPIN'95 Workshop[C]. 1995.

同被引文献27

引证文献3

二级引证文献120

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部