期刊文献+

基于时间戳私钥签名技术的Nayak-T协议安全性分析

Security analysis of Nayak-T protocol based on time stamp and private key signature
下载PDF
导出
摘要 随着信息网络的快速发展,云服务走进人们视野,云环境下信息安全问题成为人们关注的焦点。Nayak协议是一种云环境下基于口令身份认证,实现双向认证和会话密钥交换的协议。针对Nayak协议存在的中间人攻击,提出改进协议Nayak-T。Nayak-T协议在消息项内增加时间戳并更改加密手段,通过双重加密的手段来保证双方通信安全。利用四通道并行建模法对Nayak-T协议建模,运用SPIN对该协议进行验证,验证结果得出Nayak-T协议安全的结论。模型优化策略分析表明,采用静态分析、类型检查、语法重定序模型优化策略的模型检测效率最佳,可运用于类似复杂协议的形式化分析与验证。 With the rapid development of information networks, cloud services step into people's vision and the problems of information security in the cloud environment become a focus. Nayak protocol is a password authentication scheme based on the bidirectional authentication and session key agreement in the cloud environment. Targeting at man-in-the-middle attacks existing in Nayak protocol, we put forward an improved Nayak-T protocol. Nayak-T protocol adds in time stamp and changes their encryption ways inside message options to ensure the security of two-way communication through double encryption. We use the four channels parallel modeling method to model Nayak-T protocol and adopt SPIN to verify the security of this protocol. Analysis of modeling optimization strategies proves that the model testing that adopts static analysis, type checking and syntax reordering are most efficient. This method can be applied to the formal analysis and verification of similar complicated protocols.
出处 《计算机工程与科学》 CSCD 北大核心 2017年第12期2252-2259,共8页 Computer Engineering & Science
基金 国家自然科学基金(61163005 61562026) 江西省自然科学基金(20161BAB202063) 江西省对外科技合作项目(20151BDH80005) 江西省主要学科学术和技术带头人资助计划(2017BCB22015)
关键词 Nayak协议 Nayak—T协议 模型检测 私钥签名 时间戳 Nayak protocol Nayak-T protocol model checking private key signature time stamp
  • 相关文献

参考文献4

二级参考文献34

  • 1Chuan-fu Z, Jiang Y, Wan-zhong S, et al. Internet Key Exchange Protocol Simulation of HAIPE in Securi- ty Network[C]//International Conference on Cyber- Enabled Distributed Computing and Knowledge Discov- ery. IEEE,2010:250-253.
  • 2Rao M C. A Fixed Network Transmission Based on Kerberos Authentication Protocol [J]. International Journal of Engineering, 2013,2(11).
  • 3Mundra P, Shukla S, Sharma M, et al. Modeling and Verification of Kerberos Protocol using Symbolic Model Verifier[C]//International Conference on Communica- tion Systems and Network Technologies. IEEE, 2011: 651-654.
  • 4Abdelmajid N T, Hossain M A, Shepherd S, et al. Location-Based Kerberos Authentication Protocol[C]// IEEE Second International Conference on Social Com- puting. IEEE,2010:1099-1104.
  • 5Abdelmajid N T, Hossain M A, Shepherd S, et at. Improved Kerberos security protocol evaluation using modified BAN logic [C]//IEEE 10th International Conference on Computer and Information Technology. IEEE,2010:1610-1615.
  • 6Butler F, Cervesato I, Jaggard A D, et al. Formal a- nalysis of Kerberos 5[J]. Theoretical Computer Sci- ence,2006,367(1) :57-87.
  • 7Mathuria A M, Safavi-Naini R, Nickolas P R. On the automation of GNY logic[J]. Australian Computer Science Communications, 1995,17:370-379.
  • 8Cohen M, Dam M. A completeness result for BAN logic[J]. Prococeedings of Methods for Modalities, 2005,4.
  • 9Simon D, Aboba B, Hurst R, et al. The EAP-TLS Authentication Protocol [S]. Fremont, CA: The Internet Engineering Task Force (IETF), 2008.
  • 10Funk P, Wilson S. Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol, Version 0 [S]. Fremont, CA: The Internet Engineering Task Force (IETF), 2008.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部