期刊文献+

基于Petri网的密码协议形式化建模 被引量:1

Formal Modeling of Cryptographic Protocols Using Petri Nets
下载PDF
导出
摘要 密码协议是安全共享网络资源的机制和规范,是构建网络安全环境的基石,其安全性对整个网络环境的安全起着至关重要的作用。提出了采用Colored Petri Nets(CPN,着色Petri网)分析密码协议的新方法。采用新方法对TMN协议的多次并发会话通信进行形式化建模,模型依据会话配置和会话顺序进行功能单元划分,采用on-the-fly方法生成攻击路径。采用状态空间搜索技术,发现了该协议的多次并发会话不安全状态,并获得了新的攻击模式。 Cryptographic protocol is secure mechanism for sharing network resources,is the cornerstone to build securitynetwork environment.The security of the cryptographic protocol plays a vital role to entire network environment.A new colored Petri nets(CPN) methodology for security analysis of cryptographic protocol was proposed.We applied the new approach to model TMN protocol with multi concurrent session,and the model was categorized based on session configuration and session schedule.And the attack traces were obtained using on-the-fly method.Using the state space search method,several attack states of multi concurrent session were found,and a new attack pattern was obtained.
出处 《计算机科学》 CSCD 北大核心 2012年第8期70-74,共5页 Computer Science
基金 国家自然科学基金项目(61163011) 国家重点基础研究发展规划(973)项目(2007CB310702) 内蒙古自然科学基金重点项目(20080404ZD20)资助
关键词 密码协议 TMN CPN 多次并发会话 Cryptographic protocol TMN CPN Multi concurrent session
  • 相关文献

参考文献13

  • 1Jensen K, Kristensen L, Wells L. Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems[J]. In- ternational Journal on Software Tools for Technology Transfer (STTT), 2007,9 (3) : 213-254.
  • 2Dolev D,Yao A. On the security of public key protocols. Infor- mation Theory[J]. IEEE Transactions on Information Theory, 1983,29(2) :98-208.
  • 3Tatebayashi M, Matsuzaki N, Jr D B. Key distribution protocol for digital mobile communication systems[M]. Springer-Verlag, 1989,324-333.
  • 4Yu-Qing Z,Xiu-Ying L. An Approach to the Formal Analysis of TMN Protocol[M]. Progress on Cryptography, 2004:235-243.
  • 5Lowe G,Roscoe B. Using CSP to detect errors in the TMN pro- tocoI[J]. Software Engineering, IEEE Transactions on Software Engineering, 1997,23 (10) : 659-669.
  • 6薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:60
  • 7Permpoontanalarp Y. On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryp- tographic Protocols [M]. Formal Techniques for Distributed Systems, 2010 : 201-215.
  • 8A1-Azzoni I, Down D, Khedri R. Modeling and verification of cryptographic protocols using coloured petri nets and design/ CPN[J]. Nordic Journal of Computing, 2005,12 (3) : 201-228.
  • 9黎波涛,罗军舟.不可否认协议的Petri网建模与分析[J].计算机研究与发展,2005,42(9):1571-1577. 被引量:11
  • 10Tritilanunt S, Boyd C, Foo E. Using Coloured Petri Nets to Simu- late Dos-resistant Protocols [C]//Proceeding of 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools. 2006:261- 280.

二级参考文献19

  • 1RuiXue Deng-GuoFeng.New Semantic Model for Authentication Protocols in ASMs[J].Journal of Computer Science & Technology,2004,19(4):555-563. 被引量:5
  • 2G. Norman, V. Shmatikov. Analysis of probabilistic contract signing. In: Proc. BCS-FACS Formal Aspects of Security (FASec'02). New York: Springer-Verlag, 2002. 81~96.
  • 3L. Buttyun, J. P. Pierre Hubaux, S. Capkun. A formal analysis of Syverson' s rational exchange protocol. In: Proc. the 15th IEEE Computer Security Foundations Workshop. Nova Scotia,Canada: Cape Breton, 2002. 24~26.
  • 4S. Kremer, J. F. Raskin. Formal verification of non-repudiation protocols-A game approach. Formal Methods for Computer Security (FMCS 2000), Chicago, USA, 2000.
  • 5M. Abadi, B. Blanchet. Computer-assisted verification of a protocol for certified email. The 10th Int'l Symposium (SAS'03), San Diego, California, 2003.
  • 6V. Shmatikov, J. C. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 2002,283(2): 419~450.
  • 7B. B. Nieh, S. E. Tavares. Modeling and analyzing cryptographic protocols using Petri nets. In: Proc. AUSCRYPT'92. New York: Springer-Verlag, 1993.
  • 8N. Behki, S. E. Tavares. An integrated approach to protocol design. The 1989 IEEE Pacific Rim Conf. Computers,Communications and Signal Processing, BC, Canada, 1989.
  • 9T. Aura. Modelling the Needham-Schroeder authentication protocol with high level Petri nets. Helsinki University of Technology, Technical Report: B14, 1995.
  • 10A.M. Basyouni, S. E. Tavares. New approach to cryptographic protocol analysis using coloured Petri nets. In: Proc. Canadian Conf. Electrical and Computer Engineering. Nfld., Canada: St.Johns, 1997. 334~337.

共引文献69

同被引文献9

  • 1StylianosBasagiannis,PanagiotisKatsaros,AndrewPombortsis.Synthesis of attack actions using model checking for the verification of security protocols[J]. Security Comm. Networks . 2011 (2)
  • 2Catherine Meadows.The NRL Protocol Analyzer: An Overview[J]. The Journal of Logic Programming . 1996 (2)
  • 3Dolev D,Yao A C.On the security of public key protocols. Proceedings of IEEE 22nd Annual Symposium on Foundations of Computer Science . 1981
  • 4Millen, J.K.,Clark, S.C.,Freedman, S.B.The Interrogator: Protocol Secuity Analysis. Software Engineering, IEEE Transactions on . 1987
  • 5Jensen K,Kristensen L.Coloured Petri Nets:Modeling and Validation of Concurrent Systems. . 2009
  • 6CPN-Tools:. http://cpntools.org/ .
  • 7Basagiannis S,Katsaros P,Pombortsis A.Intrusion Attack Tactics for the model checking of e-commerce security guarantees. Computer Safety, Reliability, and Security . 2007
  • 8Bai Yunli,Ye Xinming.Attack trace generation of cryptographic protocols based on coloured Petri nets model. International Journal of Wireless and Mobile Computing . 2013
  • 9Tatebayashi M,Matsuzaki N,Newman Jr D B.Key distribution protocol for digital mobile communication systems. . 1989

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部