期刊文献+

基于攻击者的“角色冒充”的协议验证方法 被引量:1

Formal authentication based on identification of intruder role impersonate
原文传递
导出
摘要 网络的普及使得网络安全问题日益重要 ,协议的安全性和密码算法的安全性是网络数据安全的两个最基本的概念。介绍了几种具有代表性的安全协议的形式化验证工具 ,并提供了用 JAVA语言实现的基于攻击者和秘密的安全协议验证算法。提出了身份验证协议必须交换秘密的概念 ,还为协议的形式化验证过程设计了框架。 The size of computer networks has made network security a critical issue. Protocol security and algorithm security are two fundamental aspects of network data security. This paper introduces some classical formal authentication tools for security protocols, and describes an authentication algorithm for security protocol based on intruder identification and security implementation using JAVA. The paper discusses the important idea that an authentication protocol must exchange some secrets and presents a process for protocol authentication which is a variation of a security protocol based on the identification of the intruder and the role that he is assoming. The authentication tool then implements a falsification job.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2001年第7期72-75,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目 (69872 0 19)
关键词 网络安全 身份验证协议 密码协议 安全协议 形式化验证 攻击者 角色冒充 security protocol formal authentication intruder role impersonate
  • 相关文献

参考文献3

  • 1[1]Burrows M, Abadi M, Needham R. A Logic of Authentication [R]. ACM Transactions in Computer Systems, 8(1): 1836, February 1990.
  • 2[2]Debbabi M, Mejri M, Tawbi N, et al . Formal automatic verification of authentication cryptographic protocols [A]. 1997 Proc, 1st IEEE Int Con on Format Eng Methods [C]. 1997. 5059.
  • 3[3]Mitchell J, Michell M, and Stern U. Automated analysis of cryptographic protocols using Mur [A]. In Proceedings of the 1997 IEEE Symposium on Security and Privacy [C]. IEEE Computer Society Press, 1997. 141151.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部