期刊文献+

基于Spi演算的安全协议验证 被引量:3

VERIFYING SECURITY PROTOCOLS BASED ON SPI CALCULUS
下载PDF
导出
摘要 在安全协议的各种验证方法中,进程代数方法依托完善的进程演算理论得到了很好的应用。Spi演算在PI演算的基础上扩充了密码操作原语来刻画安全协议,并使用测试等价验证安全属性。讨论了利用Spi演算进行验证的过程,并对经典NSSK协议进行分析。 Among several authentication methods for security protocols,process algebra approach which relies on a sound theory of concurrent process calculus has been well applied.The Spi calculus depicts security protocols as an extension of the pi calculus by enriching its cryptographic primitives,and uses testing equivalence to verify security properties.The process of authentication with Spi calculus is discussed in the paper,the analysis on classical NSSK protocol is carried out using this approach as well.
作者 郑清雄
出处 《计算机应用与软件》 CSCD 2011年第3期262-264,292,共4页 Computer Applications and Software
关键词 安全协议 SPI演算 测试等价 NSSK协议 Security protocols Spi calculus Testing equivalence NSSK protocol
  • 相关文献

参考文献11

  • 1卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:117
  • 2Robin M, Joachimp P, David W. A Calculus of mobile processes, Parts ? and Parts[J]. Information and Computation, 100( 1 ) : 1 -40,41-77.
  • 3Robin M. Communication and mobile systems: the pi-calcUlus[ M]. Cambridge University Press, 1999.
  • 4Hoare C. Communicating sequential processes[M]. Prentice Hall, 1985.
  • 5Robin M. Communication and concurrency[ M]. Prentice Hall, 1989.
  • 6Martin A, Gordon A. A caculus for cryptographie protocols: the Spi calculus, The 4th ACM Conference on Computer and Communication Security[ C]. 1997:36 -47.
  • 7Clark J,Jacob J. A survey of authentication protocol literature[ OL]. http ://www. users, cs. york. ac. uk/- jac/under the link\Security Protocols Review. Version 1.0. 1997.
  • 8Nicola R, Hennessy M. Testing equivalences for processes[ J]. Theoretical Computer Science, 1984,34 :83 - 133.
  • 9Needham R, Schroeder M. Using encryption for authentication in large networks of computers [ J ]. Communications of the ACM, 1978,21 (12) :993 -999.
  • 10Denning D, Sacco G. Timestamps in key distribution protocols [ C ]// Communications of the ACM, 1981,24 ( 8 ) :533 - 536.

二级参考文献6

共引文献116

同被引文献21

  • 1Hardt D. The OAuth 2.0 Authorization Framework. IETF RFC 6749. http://tools.ietf.org/html/rfc6749.
  • 2Chari S, Jutla CS, Roy A. Universally Composable Security Analysis of OAuth v2. 0. IACR Cryptology ePrint Archive, 2011, 2011: 526.
  • 3Corella F, Karen R Lewison. security analysis of double redirection protocols. 2011. http://pomcor.corn/techreports/ DoubleRedirection.pdf.
  • 4Xu XD, Niu LY, Meng B. Automatic verification of security properties of OAuth2.0 protocol with cryptoverif in computational model. Information Technology Journal, 2013, (12): 2273-2285.
  • 5Dolev D, Yao A. On the security of public key protocols. IEEE Trans. on Information Theory, 1983, 29(2): 198-208.
  • 6Blanchet B. A computationally sound mechanized prover for security protocols. IEEE Symposium on Security and Privacy. 2006. 140-154.
  • 7Ylonen T,Lonvick C.The Secure Shell(SSH)Protocol Architecture[S].RFC 4251,2006.
  • 8Ylonen T,Lonvick C.The Secure Shell(SSH)Transport Layer Protocol[S].RFC 4253,2006.
  • 9Ylonen T,Lonvick C.The Secure Shell(SSH)Authentication Protocol[S].RFC 4252,2006.
  • 10Ylonen T,Lonvick C.The Secure Shell(SSH)Connection Protocol[S].RFC 4254,2006.

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部