期刊文献+

基于细粒度新鲜性的密码协议分析

Security Analysis of Cryptographic Protocols Based on Fine-Grained Freshness
下载PDF
导出
摘要 对新鲜性进行了细粒度的定义,并将新鲜性和秘密性结合,完善了基于新鲜性原则的密码协议分析方法。区分了不同主体产生的新鲜性标识符的可信任新鲜性,并对私有秘密和共享秘密给予了更准确的解释。改进后的基于新鲜性原则的密码协议分析方法能够分析并发现Helsinki协议中存在的微妙的安全缺陷。 Fine-grained definitions of freshness are presented,and both freshness and secrecy are combined to improve the security analysis of cryptographic protocols.Trusted freshness of the nonces generated by different principals are explicitly distinguished.More exact explanations on the private secrecy and shared secrecy are given.The improved method can analyze and find out some existing subtle weaknesses in the Helsinki protocol.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第5期763-770,共8页 Acta Scientiarum Naturalium Universitatis Pekinensis
基金 国家自然科学基金(60973111 60903189) 国家高技术研究发展计划专项经费(2009AA01Z418) 国家重点基础研究发展计划项目(2007CB311201)资助
关键词 密码协议 新鲜性 秘密性 cryptographic protocol freshness secrecy
  • 相关文献

参考文献10

  • 1Needham R M, Schroeder M D. Using encryption for authentication in large network of computers. Communication of the ACM, 1978, 21(12) : 993-999.
  • 2Lowe G. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 1995, 56(3): 131-133.
  • 3Dolev D, Yao A C. On the security of public key protocols. IEEE Transactions on Information Theory, 1983, 29(2) : 198-208.
  • 4Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990, 8(1) : 18-36.
  • 5Gong L, Needham R, Yahalom R. Reasoning about belief in crypto-graphic protocols. Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, 1990:234-248.
  • 6Syverson P, Van Oorschot P. On unifying some cryptographic protocol logics. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, 1994 : 14-28.
  • 7董玲,陈克非,来学嘉.密码协议分析的信任多集方法[J].软件学报,2009,20(11):3060-3076. 被引量:5
  • 8ISO. ISO/IEC 2nd DIS 11770-3: key management- Part 3: mechanisms using asymmetric techniques. Geneva : International Organization for Standardization, 1997.
  • 9Mitchell C J, Yeun C Y. Fixing a problem in the Helsinki protocol. ACM Operating Systems Review, 1998, 32(4): 21-24.
  • 10Burrows M, Abadi M, Needham R M. A logic of authentication [ R/OL ]. ( 1989- 02 ) [ 2010- 01- 08 ]. http: //www. hpl. hp. eom/techreports/compaq-DEC/ SRC-RR-39. pdf.

二级参考文献10

  • 1Lowe G.An attack on the needham-schroeder public key authentication protocol[].Information Processing Letters.1995
  • 2Lowe G.Towards a completeness result for model checking of security protocols[].Journal of Computer Security.1999
  • 3Denning D,Sacco G.Timestamps in key distribution protocols[].Communications of the ACM.1978
  • 4.Wireless LAN medium access control (MAC)and physical layer (PHY)specifications:medium access control (MAC)security enhancements[].IEEE Stdi.2004
  • 5Abadi M,Needham R.Prudent engineering practice for cryptographic protocols[].IEEE Transactions on Software Engineering.1996
  • 6Needham R,Schroeder M.Using encryption for authentication in large networks of computers[].Communications of the ACM.1978
  • 7Burrows M,Abadi M,Needham R M.A Logic of Cryptographic[].ACM Transactions on Computer Systems.1990
  • 8Goldwasser S,Micali S.Probabilistic Encryption[].Journal of Computer and System Sciences.1984
  • 9Bellare M,Rogaway P.Random oracles are practical: a paradigm for designing efficient protocols[].Proceedings of first ACM conference on Computer and Communications Security.1993
  • 10Lowe G.Breaking and Fixing the Needham-Schroeder Public-key Protocol Using FDR[].Proceedings of the nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems.1996

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部