期刊文献+

基于角色冒充对数字签名协议的攻击(英文)

An Attack on Digital Signature Protocol Based on Intruder's Role Impersonate
下载PDF
导出
摘要 实现对具有数字签名的身份认证协议进行验证 .从攻击者的角度 ,基于角色冒充的方法 ,使用逆向归结的推理方式 ,采用 JAVA来实现验证算法 .对于一些具有数字签名的协议 ,可以进行有效的验证 . Security protocols play more and more important role with the bursting development of Internet. Formal authentication is an effective way to detect flaws in those protocols. There are many automatic checkers for verifying protocols, but few can deal with digital signature protocols. This paper proposes a new tool for formal automatic verifying. It can have an effective check for digital signature protocols. It is based on intruder's role impersonate and backward deduction. It was implemented by using JAVA.
出处 《软件学报》 EI CSCD 北大核心 2001年第12期1769-1774,共6页 Journal of Software
基金 国家自然科学基金~~
关键词 数字签名 形式化验证 角色冒充 通信协议 网络安全 security protocol digital signature formal authentication intruder role impersonate
  • 相关文献

参考文献1

二级参考文献3

  • 1[1]Burrows M, Abadi M, Needham R. A Logic of Authentication [R]. ACM Transactions in Computer Systems, 8(1): 1836, February 1990.
  • 2[2]Debbabi M, Mejri M, Tawbi N, et al . Formal automatic verification of authentication cryptographic protocols [A]. 1997 Proc, 1st IEEE Int Con on Format Eng Methods [C]. 1997. 5059.
  • 3[3]Mitchell J, Michell M, and Stern U. Automated analysis of cryptographic protocols using Mur [A]. In Proceedings of the 1997 IEEE Symposium on Security and Privacy [C]. IEEE Computer Society Press, 1997. 141151.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部