期刊文献+

对Yahalom-Paulson协议的分析与改进 被引量:1

Analysis of Yahalom-Paulson protocol and its improvement
下载PDF
导出
摘要 对原始Yahalom-Paulson协议和Backes与Pfitzmann的简化Yahalom-Paulson协议进行分析,指出各自协议中存在的漏洞.原始协议中存在类型缺陷攻击,简化协议中存在重放攻击导致协议参与实体间会话密钥不一致.对Yahalom-Paulson协议作出改进并使用串空间理论证明改进后协议的正确性. A detailed analysis of the original Yahalom-Paulson protocol and its simplified version given by Backes and Pfitzmann was presented.It was found that there exists a type flaw attack on the original one and the simplified one can not guarantee the agreement on new session keys between legitimate parties due to replay attacks.The protocol was adapted and the new version was proved correct based on strand space theory.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2010年第1期98-102,共5页 JUSTC
基金 国家自然科学基金重大研究计划(90104010) 国家自然科学基金(60241004) 国家重点基础研究发展(973)计划(2003CB314801)资助
关键词 Yahalom-Paulson协议 类型缺陷攻击 串空间 Yahalom-Paulson protocol type flaw attack strand space
  • 相关文献

参考文献9

  • 1Burrows M, Abadi M, Needham R M. A logic of authentication[J]. Proceedings of the Royal Society of London, 1989, 426:223- 271.
  • 2Paulson L C. Relations between secrets: Two formal analyses of the Yahalom protocol [J]. Journal of Computer Security, 2001, 9(3): 197-216.
  • 3Paul Syverson. A taxonomy of replay attacks[C]// Proceedings of the Computer Security Foundations Workshop(CSFW 7), 1994: 187-191.
  • 4Carlsen U. Cryptographic protocol flaws: Know your enemy[C]//Proceeding s of the Computer Security Foundations Workshop(CSFW 7), 1994: 192-200.
  • 5Michael Backes, Birgit Pfitzmanru On the cryptographic key secrecy of the strengthened Yahalom protocol[C]//Proceedings of 21st IFIP International Information Security Conference (SEC), 2006. 233 245.
  • 6Gavin Lowe. Towards a completeness result for model checking of security protocols[J]. Journal of Computer Security, 1999, 7(2-3): 89-146.
  • 7Fabrega F T, Herzog J, Guttman J. Strand spaces: Why is a security protocol correct? [C]//Proceedings of 1998 IEEE Symposium on Security and Privacy, 1998:160- 171.
  • 8Fabrega F T, Herzog J, Guttman J. Honest ideals on strand spaces [C]//Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998: 66-77.
  • 9Fabrega F T, Herzog J, Guttman J. Strand spaces: Proving security protocols correct[J]. Journal of Computer Security, 1999, 7(2-3): 191-230.

同被引文献6

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部