期刊文献+

认证测试方法的扩展及其应用 被引量:1

Extensions to Authentication Test and Its Application
下载PDF
导出
摘要 基于串空间模型的认证测试方法分析协议的安全性有一定的局限性,只能分析有限的协议.因此,对基于串空间模型的认证测试方法进行了扩展,通过修改测试分量和认证测试规则,对该方法进行了改进,运用扩展后的认证测试方法对使用签名和哈希函数的TLS协议进行了分析,扩大了认证测试方法的使用范围;并提出了对测试分量新鲜性的检验,进一步完善了认证测试方法. Authentication test method has certain limitations in analyzing the safety of security protocol because of its limited analysis area.Therefore,authentication test method based on the strand space model was extended by modifying the test component and authentication test rules to improve the method.This revised method is used for the firt time to analyze TLS protocol that included signature and hash function.It enlarged analyzing area of authentication test.Furthermore,the paper pointed out that It is necessary to check up freshment of the test segment,which makes authentication test method more perfect.
出处 《郑州大学学报(工学版)》 CAS 北大核心 2010年第3期50-53,共4页 Journal of Zhengzhou University(Engineering Science)
基金 国家"863"计划资助项目(2007AA010408)
关键词 串空间模型 认证测试 TLS协议 哈希函数 测试分量 strand space model authentication test TLS protocol hash function test segment
  • 相关文献

参考文献5

  • 1王惠斌,祝跃飞,常青美.协议组合逻辑系统研究[J].郑州大学学报(理学版),2008,40(4):56-59. 被引量:4
  • 2JOSHUA D G,FABREGA F J T. Authentication tests [ J ]. In:Proceedings,2000 IEEE Symposium on security and Privacy. Dakland, CA, USA: IEEE Computer Society Press, 2000,10( 8 ) : 16 - 20.
  • 3GUTTMAN J D,THAYER F. Authentication tests and the structure of bundles[ J]. Theoretical Compuer Science ,2002,20( 15 ) :55 - 60.
  • 4LIU D X, LI X Y, BAY C I. An attack - finding algorithm for security protocols [ J ]. Journal of Computer Science and Technology ,2002,22( 18 ) :32 - 38.
  • 5张岚,何良生.串空间理论的扩展及其应用[J].计算机工程与应用,2006,42(18):136-138. 被引量:1

二级参考文献17

  • 1常亚勤,王滨,张少武.一个无线认证协议的分析与改进[J].郑州大学学报(理学版),2006,38(2):40-42. 被引量:1
  • 2Mao W B.现代密码学的理论与实践[M].王继林,译.北京:电子工业出版社,2004:389-390.
  • 3Datta A, Derek A, Mitchell J C,et al. Protocol Composition Logic (PCL)[J]. Electronic Notes in Theoretical Computer Science(ENTCS), 2007, 172 : 311-358.
  • 4Roy A, Datta A, Derek A, et al. Secrecy analysis in Protocol Composition Logic[C]//The llth Annual Asian Computing Science Conference (ASIAN'06). Tokyo, 2006.
  • 5Burrows M, Abadi M, Needham R. A logic of authentication[J]. ACM Transactionson Computer Systems, 1990,8(1) : 18-36.
  • 6Paulson L C. Proving properties of security protocols by induction[C]// Proceedings of the 10th IEEE Computer Society Symposium on Research in Security and Privacy. USA: Rockport, MA, 1997: 70-83.
  • 7季庆光.广义Strand space理论及其应用[C].见:信息安全国家重点实验室安全协议研讨会文集.2004
  • 8Jonathan C.Herzog The Diftle-Hellman Key-Agreement Scheme in the Strand-Space Model[C].In:Proceedings,16th IEEE Computer Security Foundations Workshop,IEEECS Press,2003
  • 9Blog:利用HTTP协议和IE的漏洞在其他计算机上运行一个程序.http://blog.csdn.net/orbit/
  • 10G Lowe.Breaking and fixing the needham-schroder public-key protocol using FDR[C].In:Tools and Algorithms for the Construction and Analysis of Systems ,Springer-Verlag, 1996 ; 1055 : 147-166

共引文献3

同被引文献7

  • 1薛锐.安全协议的形式化分析方法及其发展现状[A]北京:电子工业出版社,2009103-138.
  • 2Thayer F J,Herzog JC,Guttman JD. Strand spaces:Why is a security protocol correct[A].Los Alamitos.CA:IEEE Computer Society Press,1998.160-171.
  • 3Thayer FJ,Herzog JC,Guttman JD. Strand spaces:Proving security protocols correct[J].Journal of Computer Security,1999,(2,3):191-230.
  • 4Thayer F J,Herzog JC,Guttman JD. Strand spaces:Honest ideals on strand spaces[A].LosAlamitos:IEEE Computer Society Press,1998.66-77.
  • 5薛锐;冯登国.安全协议理论与方法[M]北京:科学出版社,2003196-199.
  • 6程莹,肖美华.Otway-Rees协议的分析及改进[J].计算机与现代化,2010(6):74-76. 被引量:1
  • 7董学文,牛文生,马建峰,谢晖,毛立强.基于串空间的匿名形式化分析扩展[J].通信学报,2011,32(6):124-131. 被引量:2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部