期刊文献+

一种分析和改进安全协议的新方法

A new method for analyzing and improving security protocols
下载PDF
导出
摘要 分析安全协议的执行过程,给出驱动模块(Driving Module,DM)的定义,利用串空间模型构建常规DM和攻击DM,由此给出一种基于驱动模块的模型检验方法。理论分析显示,该方法搜索广度和深度完善,能避免状态空间爆炸问题,可用于获得有缺陷安全协议的攻击剧本,并证明无缺陷安全协议的安全性。用该方法分析OtwayRees协议和TLS协议,获得了Otway-Rees协议的攻击剧本,得出了Otway-Rees协议的两个安全改进版本,说明了TLS协议的安全性。 By analyzing the process of security protocols, the definition of driving module (DM) is introduced, and then regular and penetrator DMs are formed according to the Strand Space Model (SSM). Based on this, a DM-based model checking method is proposed. Theoretical analysis indicates that this method is prefect in terms of searching breadth and depth, and can avoid the state space explosion problem. Therefore, this method can be used not only to get the attack scenarios of a flawed security protocol, but also to prove that an unflawed security protocol is secure. Moreover, the Otway-Rees protocol and the TLS protocol are analyzed based on this method. As a result, various attack scenarios of the Otway-Rees protocol are discovered and two secure improved Otway-Rees protocols are put forward, and therefore the TLS protocol is proved to be secure.
出处 《西安邮电大学学报》 2015年第5期17-23,共7页 Journal of Xi’an University of Posts and Telecommunications
基金 国家自然科学基金资助项目(61402367) 陕西省信息化技术研究计划资助项目(2013-008) 西安邮电大学青年教师科研基金资助项目(401-1201)
关键词 驱动模块 串空间模型 安全协议 模型检验 攻击剧本 driving module, strand space model, security protocols, model checking, attack scenarios
  • 相关文献

参考文献17

  • 1Dolev D, Yao A. On the security of public key proto- cols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198-208.
  • 2Burrows M, Abadi M, Needham R. A logic of authen- tication[J]. ACM Transactions on Computer System, 1990, 8(1): 18-36.
  • 3慕建君.一种形式化分析安全协议的新模型[J].西安电子科技大学学报,2006,33(3):381-385. 被引量:2
  • 4Mitchell J, Mitchell M, Stern U. Automated analysisof cryptographic protocols using Mur0[C]// Proceed- ings of the 1997 IEEE Symposium on Security and Pri- vacy. USA: IEEE Computer Society Press, 1997:141- 151.
  • 5Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR Tools and Algorithms for the Construction and Analysis of Systems[C]// Volume 1055 of Lecture Notes in Computer Science. Beilin: Springer Verlag, 1996 : 147-166.
  • 6Meadows C. The NRL Protocol Analyzer: an overview [J]. Journal of Logic Programming, 1996, 26 (2): 113-131.
  • 7Paulson L C. Proving Properties of Security Protocols by Induction[C]//Proceedings of the IEEE Computer Security Foundations Workshop X. New York: IEEE Computer Society Press, 1997: 70-83.
  • 8Thayer Fdbrega F J, Herzog J C, Guttman J D. Strand Spaces: Why Is a Security Protocol Correct [C]//Proceedings of the 1998 IEEE Symposium on Se- curity and Privacy. New York: IEEE Computer Press, 1998:160-171.
  • 9Guttman J D, Thayer F J. Authentication tests[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. USA: IEEE Computer Society Press, 2000 : 150-164.
  • 10Herzog J C. The Diffie-Hellman key-agreementscheme in the strand space model[C]//Proc of the 16th IEEE Computer Security Foundations Workshop. Pacific Grove: IEEE Computer Society, 2003: 234-247.

二级参考文献30

  • 1季晓君,田畅,张毓森.安全DSR路由协议分析与设计[J].通信学报,2006,27(3):136-140. 被引量:7
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3国务院办公厅.国务院关于推进物联网有序健康发展的指导意见[EB/OL].(2013-02-17).http://www.gov.cn/zwgk/2013-02/17/content一2333141.htm2013.
  • 4Lowe G. Breaking and fixing the needham-schroeder public- key pprotocol using FDR [ M ] //Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidel- berg, 1996:147 - 166.
  • 5Armstrong P, Goldsmith M, Lowe G, et al. Recent develop-ments in FDR [ C ] //Computer Aided Verification. Springer Berlin Heidelberg, 2012 : 699 - 704.
  • 6Lowe G, Roscoe B. Using CSP to detect errors in the TMN protocol [ J ]. Software Engineering, IEEE Transactions on, 1997, 23 (10) : 659-669.
  • 7Palikareva H, Ouaknine J, Roscoe A W. SAT-solving in CSP trace refinement [ J ]. Science of Computer Program-ming, 2012, 77 (10): 1178-1197.
  • 8Shaikh S A, Bush V J, Schneider S A. Specifying authentica- tion using signal events in CSP[ C ]//Information Security and Cryptology. Springer Berlin Heidelberg,2005 : 63 - 74.
  • 9WC,802. 11 - Wireless LAN Working Group. 802. 11 w - 2009 - IEEE Standard [ S].
  • 10Papadimitratos P,Haas ZJ.Secure routing for mobile ad hoc networks. Proc.of the CNDS 2002 . 2002

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部