期刊文献+

基于串空间认证测试理论的认证协议分析 被引量:2

Authentication protocol analysis based on certification test theory in strand space
下载PDF
导出
摘要 对增强型认证测试理论进行简化,使其能更好、更高效地分析协议的认证性。将其应用到对OR协议的分析中,发现协议存在的缺陷,对协议进行改进,并对改进后的协议进行了分析验证。 This paper simplifies the theory of enhanced certification testing to make it better for analysis of authentication protocols, and by applicating it to the analysis of the OR agreement, it finds defects in agreement. The agreement is modified, and the improved authentication protocol is also verified.
出处 《微型机与应用》 2012年第1期51-54,共4页 Microcomputer & Its Applications
基金 湖北省自然科学基金(2006ABA056) 湖北省教育厅重点项目(D20092203) 湖北省教育厅青年项目(Q20102503)
关键词 串空间模型 认证测试 关联性理论 strand space theory certification testing relevance concepts
  • 相关文献

参考文献11

  • 1Fabrega F J T, HERZOG J C, GUTrMAN J D. Strand spaces: why is a security protocol correct? [C]. Proceedings of the 1998 IEEE Symposium on Security and Privacy, 1998 : 160-171.
  • 2Fabrega F J T, HERZOG J C, GUTFMAN J D. Strand spaces: proving security protocols correct [J]. Jt, urnal of Computer Security, 1999,7 (2-3) : 191-230.
  • 3杨明,罗军舟.基于认证测试的安全协议分析[J].软件学报,2006,17(1):148-156. 被引量:16
  • 4GUTI'MAN J D, F~tbrega F J T. Authentication tests[C]. Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000:96-109.
  • 5GurI~MAN J D, Fabrega F J T. Authentication tests and the structure of bundles [J]. Theoretical Computer Science, 2002,283(2) :333-380.
  • 6GUTYMAN J D. Security protocol design via authentication tests [C]. Proceedings of the 2002 IEEE Computer Security Foundations Workshop, 2002:92-103.
  • 7WOO T Y C, LAM S S. A semantic model for authentication protocols [C]. Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993 : 178-194.
  • 8季庆光,卿斯汉,周永彬,冯登国.Study on Strand Space Model Theory[J].Journal of Computer Science & Technology,2003,18(5):553-570. 被引量:7
  • 9BURROWS M, ABADI M, NEEDHAMR. A logic of authentication [J]. ACM Transaction in Computer System, 1990,8(1 ) : 18-23.
  • 10卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:118

二级参考文献26

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2Fabrega FJT, Herzog JC, Guttman JD. Strand spaces: Why is a security protocol correct? In: Proc. of the 1998 IEEE Symp, on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998, 160-171, http://ieeexplore.ieee.org/ie14/5528/14832/00674832.pdf? tp=&arnumber=674832&isnumber=14832.
  • 3Fitbrega FJT, Herzog JC, Guttman JD. Strand spaces: Proving security protocols corect. Journal of Computer Security, 1999,7(2-3):191-230.
  • 4Paulson LC. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6(1):85-128.
  • 5Guttman JD, F/ibrcga FJT. Authentication tests. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2000. 96-109. http://ieeexplore.ieee.org/ie15/6864/18435/00848448.pdf?.tp=&arnumber=848448&isnumber=18435.
  • 6Guttman JD, F/ibrega FJT. Authentication tests and the structure of bundles. Theoretical Computer Science, 2002,283(2):333-380.
  • 7Guttman JD. Security protocol design via authentication tests, In: Proc. of the 2002 IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 2002.92-103. http://ieeexplore.ieee.org/ie15/7957/21985/01021809.pdf?tp=&arnumber- 1021809&isnumbet=21985.
  • 8Woo TYC, Lam SS. A semantic model for authentication protocols, In: Proe. of the 1993 IEEE Computer Society Symp. on Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 178-194. http://ieeexplore.ieee.org/iel2/902/7168/00287633.pdf?tp=&arnumber=287633&isnumber=7168.
  • 9Song DXD. Athena: A new efficient automatic checker for security protocol analysis. In: Proc. of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 1999. 192-202. http://ieeexplore.ieee,org/ie15/6332/16921/00779773.pdf?tp=&arnumber=779773&isnumber= 16921.
  • 10Song D, Berezin S, Pcrrig A. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 2001,9( 1):47-74.

共引文献142

同被引文献19

  • 1李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 2杨明,罗军舟.基于认证测试的安全协议分析[J].软件学报,2006,17(1):148-156. 被引量:16
  • 3李谢华,李建华,杨树堂.基于认证测试的通用安全协议设计方法[J].上海交通大学学报,2006,40(3):524-527. 被引量:4
  • 4国务院办公厅.国务院关于推进物联网有序健康发展的指导意见[EB/OL].(2013-02-17).http://www.gov.cn/zwgk/2013-02/17/content一2333141.htm2013.
  • 5Lowe G. Breaking and fixing the needham-schroeder public- key pprotocol using FDR [ M ] //Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidel- berg, 1996:147 - 166.
  • 6Armstrong P, Goldsmith M, Lowe G, et al. Recent develop-ments in FDR [ C ] //Computer Aided Verification. Springer Berlin Heidelberg, 2012 : 699 - 704.
  • 7Lowe G, Roscoe B. Using CSP to detect errors in the TMN protocol [ J ]. Software Engineering, IEEE Transactions on, 1997, 23 (10) : 659-669.
  • 8Palikareva H, Ouaknine J, Roscoe A W. SAT-solving in CSP trace refinement [ J ]. Science of Computer Program-ming, 2012, 77 (10): 1178-1197.
  • 9Shaikh S A, Bush V J, Schneider S A. Specifying authentica- tion using signal events in CSP[ C ]//Information Security and Cryptology. Springer Berlin Heidelberg,2005 : 63 - 74.
  • 10WC,802. 11 - Wireless LAN Working Group. 802. 11 w - 2009 - IEEE Standard [ S].

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部