期刊文献+

协议主体密钥在测试组件构造上的性质分析 被引量:6

Analysis on properties for principals'keys on construction of test components
下载PDF
导出
摘要 针对认证测试理论在测试组件构造方面缺少具体形式化构造规则的不足,根据协议主体在认证测试中的角色特点,以及包含惟一源发消息的消息组件在认证测试中的作用和性质,对消息组件进行分类和定义并提出认证测试模型的概念,基于认证测试模型给出协议主体密钥在测试组件构造上的性质命题,同时运用认证测试基础理论对命题进行正确性证明,从而确定测试组件构造的形式化规则。 In view of the deficiency of no specific formal construction rules for authentication test theory on the construction of test component, according to the characteristics of the roles which protocol principal plays in the authentication test of some message, along with the role and nature of the message components which contain the message coming from the only one source in the test, message components are reclassified and defined, as well the concept of authentication test model is proposed on the basis of message components' new classification and new definition, and then the propositions for the property of principals' keys on the construction of authentication test components are given based on authentication test model. The correctness proof for these propositions is carried on by using basis theory of authentication test at the same time, thus the formal rules which can be applied to the construction of authentication test components are determined.
作者 余磊 魏仕民
出处 《计算机工程与应用》 CSCD 2013年第6期114-117,共4页 Computer Engineering and Applications
基金 安徽高校省级自然科学研究项目(No.KJ2012B158)
关键词 安全协议 形式化分析方法 串空间模型 认证测试 消息组件 测试组件 security protocol formal analysis method strand space model authentication test message component authentica- tion test component
  • 相关文献

参考文献16

  • 1Guttman J D,Fàbrega F J T.Authentication tests[C] //Proceed-ings of the2000IEEE Symp on Security and Privacy.Los Alamitos:IEEE Computer Society Press,2000:96-109.
  • 2Guttman J D,Fàbrega F J T.Authentication tests and the structure of bundles[J].Theoretical Computer Science,2002,283(2):333-380.
  • 3Guttman J D,Fàbrega F J T.Key compromise,strand spaces and the authentication tests[C] //Proceedings of the17th Conf on the Mathematical Foundations of Programming Semantics.[S.l.] :Elsevier BV,2001:141-161.
  • 4Fàbrega F J T,Herzog J C,Guttman J D.Strand spaces:why is a security protocol correct[C] //Proceedings of the1998IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society Press,1998:160-171.
  • 5Fàbrega F J T,Herzog J C,Guttman J D.Strand spaces:prov-ing security protocols correct[J].Journal of Computer Security,1999,7(2/3):191-230.
  • 6Fabrega F J T,Herzog J C,Guttman J D.Honest ideals on strand space[C] //Proceedings of the11th IEEE Computer Security Foundations Workshop.Washington:IEEE Computer Society Press,1998:66-77.
  • 7Guttman J D.Security protocol design via authentication tests[C] //Proceedings of the2002IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,2002:92-103.
  • 8李谢华,李建华,杨树堂.基于认证测试的通用安全协议设计方法[J].上海交通大学学报,2006,40(3):524-527. 被引量:4
  • 9余磊,魏仕民.网络管理中一种互认证密码协议的安全性分析[J].计算机工程与应用,2012,48(4):94-96. 被引量:4
  • 10刘家芬,周明天.认证测试方法对X.509认证协议的分析[J].计算机工程与应用,2006,42(8):23-25. 被引量:2

二级参考文献70

  • 1蒋睿,李建华,潘理.基于Strand Space模型的CCITT X.509协议分析[J].上海交通大学学报,2004,38(z1):169-173. 被引量:4
  • 2沈海峰,薛锐,黄河燕,陈肇雄.串空间理论扩展[J].软件学报,2005,16(10):1784-1789. 被引量:16
  • 3李谢华,李建华,杨树堂,诸鸿文.认证测试方法在安全协议分析中的应用[J].计算机工程,2006,32(2):19-22. 被引量:2
  • 4杨明,罗军舟.基于认证测试的安全协议分析[J].软件学报,2006,17(1):148-156. 被引量:16
  • 5蒋睿,胡爱群,李建华.基于Authentication Test方法的高效安全IKE形式化设计研究[J].计算机学报,2006,29(9):1694-1701. 被引量:4
  • 6Fabrega FJT, Herzog JC, Guttman JD. Strand spaces: Why is a security protocol correct? In: Proc. of the 1998 IEEE Symp, on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998, 160-171, http://ieeexplore.ieee.org/ie14/5528/14832/00674832.pdf? tp=&arnumber=674832&isnumber=14832.
  • 7Fitbrega FJT, Herzog JC, Guttman JD. Strand spaces: Proving security protocols corect. Journal of Computer Security, 1999,7(2-3):191-230.
  • 8Paulson LC. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6(1):85-128.
  • 9Guttman JD, F/ibrcga FJT. Authentication tests. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2000. 96-109. http://ieeexplore.ieee.org/ie15/6864/18435/00848448.pdf?.tp=&arnumber=848448&isnumber=18435.
  • 10Guttman JD, F/ibrega FJT. Authentication tests and the structure of bundles. Theoretical Computer Science, 2002,283(2):333-380.

共引文献30

同被引文献84

引证文献6

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部