期刊文献+

基于CCS的加密协议分析 被引量:5

CCS-based Cryptographic Protocol Analysis
下载PDF
导出
摘要 加密协议的分析需要形式化的方法和工具.该文定义了加密协议描述语言PEP(principals+environment=protocol),并说明对于一类加密协议,其PEP描述可以转化为有穷的基本CCS进程,由此可以在基于CCS的CWB(concurrencyworkbench)工具中分析加密协议的性质.此方法的优点在于隐式地刻画攻击者的行为,试图通过模型检查(modelchecking)发现协议潜在的安全漏洞,找到攻击协议的途径. Formal methods and tools are key aspects for the analysis of cryptographic protocols. In this paper, aformal language PEP (principals + environment = protocol ) for the specification of cryptograph is proposed. For some cryptographic protocols, their PEP specifications can be translated into finite basic CCSprocesses, so it is possible to analyze the security properties using CCS-based tools such as CWB (concurrencyworkbench). The advantage of the mothod proposed in this paper is that the actions of the attacker can beimplicitly specified, and if the potential back door of the protocol analyzed exists, the attacking action trace can beexplicitly found out by model checker.
作者 丁一强
出处 《软件学报》 EI CSCD 北大核心 1999年第10期1102-1107,共6页 Journal of Software
基金 国家自然科学基金
关键词 加密协议 协议分析 CCS 计算机网络 Cryptographic protocols, protocol analysis, formal methods, CCS, model checking.
  • 相关文献

同被引文献28

  • 1林闯,吴建平,王鼎兴.随机高级Petri网用于计算机网络传输协议的模型与性能评价[J].通信学报,1994,15(6):9-16. 被引量:8
  • 2龚正虎.利用CCS的协议描述与验证技术的研究[J].计算机研究与发展,1995,32(3):61-65. 被引量:5
  • 3庞其祥,程时端,金跃辉.EFSM的等价转换和通信协议一致性测试[J].通信学报,1997,18(4):37-42. 被引量:3
  • 4Miler R. A Calculus for Communicating System[J]. LNCS, 1980,92.
  • 5Dutertre B, SchneNer S. Using a PVS Embedding of CSP to Verify security protocols[ A]. Bell Labs. Theorem Proving in Higher Order Logics[C]. New Jersey: Murray Hill, 1997.
  • 6Gavin Lowe, Jim Davies. Using CSP to verify sequential consistency[ J ]. Distrib. Comput, 1999( 12): 91-103.
  • 7Abadi M, Gordon A D. A Calculus for Cryptographic protocols the Spi Calculus [ A]. Proceeding of the 4th ACM Conf. on Computer and Communication Security[C]. Berlin: ACM Press, 1997.
  • 8Jensen K. An Introduction to the Practical Use of Coloured Petri Nets[J ]. Lecture Notes in Computer Science. 1998,1492:237-292.
  • 9Jensen K. An Introduction to the Theoretical Aspects of Coloured Petri Nets[J ]. Lecture Notes in Computer Science. 1994,803:230-272.
  • 10WOO T,LAM S.A semantic model for authentication protocols[C]// Proceedings of the IEEE CS Symposium on Research in Security and Privacy.Oakland:IEEE Computer Society Press,1993:178-194.

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部