期刊文献+

一种分析会话密钥分配协议的新方法

A New Method for Analyzing Session Key Distributed Protocols
下载PDF
导出
摘要 通过对协议执行过程的分析,给出了驱动模块(Driving Module,DM)的定义。然后,结合串空间模型构建了常规者DM和攻击者DM,并在此基础上提出了一种分析会话密钥分配协议的新攻击构造法——基于DM的模型检验方法。定理证明和实例分析表明,该方法的搜索广度和深度都是完善的,而且可以避免状态空间爆炸问题。 By analyzing the process of a security protocol, the definition of Driving Module(DM) is given. Then, regu- lar and penetrator DMs are formed according to the Strand Space Model(SSM). Finally, a new method for analyzing session key distributed protocols is proposed based on these regular and penetrator DMs, i.e. a model checking method based on DMs. Theorem proofs and case analysis show that the search breadth and depth of this method is prefect, and it can avoid the state space explosion problem.
出处 《计算机与数字工程》 2015年第7期1283-1287,1359,共6页 Computer & Digital Engineering
基金 国家自然科学基金项目(编号:61402367) 陕西省信息化技术研究项目(编号:2013-008 2014-004) 西安邮电大学青年教师科研基金项目(编号:401-1201)资助
关键词 驱动模块 会话密钥分配协议 模型检验 攻击剧本 driving module, session key distributed protocols, model checking, attack scenarios
  • 相关文献

参考文献14

  • 1DOLEV D, YAO A. On the security of public key pro- tocols[J]. IEEE Transactions on Information Theory, 1983,29(2) : 198-208.
  • 2BURROWS M, ABADI M, NEEDHAM R. A logic of authentication[J]. ACM Transactions on Computer System, 1990,8(1) : 18-36.
  • 3MITCHELL J, MITCHELL M, STERN U. Automa- ted analysis of eryptographic protocols using MuroEC]//Proceedings of the 1997 IEEE Symposium on Se- curity and Privacy. USA: IEEE Computer Society Press, 1997 : 141-151.
  • 4LOWE G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Tools and Algorithms for the Construction and Analysis of Systems[C]//Vol- ume 1055 of Lecture Notes in Computer Science. Bei- lin: Springer Verlag, 1996 : 147-166.
  • 5MEADOWS C. The NRL Protocol Analyzer.- an over- view[J]. Journal of Logic Programming, 1996,26 (2) : 113-131.
  • 6PAULSON L (2. Proving Properties of Security Proto- cols by Induction[C]//Proceedings of the IEEE Com- puter Security Foundations Workshop X. New York: IEEE Computer Society Press, 1997 : 70-83.
  • 7THAYER Fabrega F J, HERZOG J C, GUTTMAN J D. Strand Spaces: Why Is a Security Protocol Correct? EC]//Proceedings of the 1998 IEEE Symposium on Se- curity and Privacy. New York: 1EEE Computer Press, 1998:160-171.
  • 8GUTTMAN J D, THAYER F J. Authentication tests EC]//Proceedings of the 2000 IEEE Symposium on Se- curity and Privacy. USA: IEEE Computer Society Press, 2000 : 150-164.
  • 9董学文,马建峰,牛文生,毛立强,谢辉.基于串空间的Ad Hoc安全路由协议攻击分析模型[J].软件学报,2011,22(7):1641-1651. 被引量:8
  • 10泰彬彬,王俊芳.基于串空间认证测试的DTLS协议认证性分析[J].计算机与网络,2014,40(24):51-54. 被引量:4

二级参考文献29

  • 1季晓君,田畅,张毓森.安全DSR路由协议分析与设计[J].通信学报,2006,27(3):136-140. 被引量:7
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3国务院办公厅.国务院关于推进物联网有序健康发展的指导意见[EB/OL].(2013-02-17).http://www.gov.cn/zwgk/2013-02/17/content一2333141.htm2013.
  • 4Lowe G. Breaking and fixing the needham-schroeder public- key pprotocol using FDR [ M ] //Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidel- berg, 1996:147 - 166.
  • 5Armstrong P, Goldsmith M, Lowe G, et al. Recent develop-ments in FDR [ C ] //Computer Aided Verification. Springer Berlin Heidelberg, 2012 : 699 - 704.
  • 6Lowe G, Roscoe B. Using CSP to detect errors in the TMN protocol [ J ]. Software Engineering, IEEE Transactions on, 1997, 23 (10) : 659-669.
  • 7Palikareva H, Ouaknine J, Roscoe A W. SAT-solving in CSP trace refinement [ J ]. Science of Computer Program-ming, 2012, 77 (10): 1178-1197.
  • 8Shaikh S A, Bush V J, Schneider S A. Specifying authentica- tion using signal events in CSP[ C ]//Information Security and Cryptology. Springer Berlin Heidelberg,2005 : 63 - 74.
  • 9WC,802. 11 - Wireless LAN Working Group. 802. 11 w - 2009 - IEEE Standard [ S].
  • 10Papadimitratos P,Haas ZJ.Secure routing for mobile ad hoc networks. Proc.of the CNDS 2002 . 2002

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部