期刊文献+

基于串空间的安全协议形式化验证模型及算法 被引量:9

A Formal Model and Algorithm for Verifying Security Protocols Based on Strand Spaces
下载PDF
导出
摘要 网络安全在信息时代非常重要 ,而网络安全的关键问题之一是安全协议 首先介绍了当前安全协议形式化验证的前沿方向———串空间理论 ,随后阐述了基于该理论设计的自动验证模型———T模型 ,给出了该模型的算法及描述 ,并通过验证改进前后的Needham Network security is very important in the information era, while the security protocol is one of the key problems of the network security In this paper, a model of strand spaces, a current leading branch of formal automatic verifying, is described in detail Based on the model of strand spaces, a model checker T is designed for the analysis of security protocols When model T is used, the number of reachable states decreases significantly After that, the framework and the algorithm level descriptions of model T are given It is presented and demonstrated with the Needham Schroeder protocol and the Needham Schroeder Lowe protocol
出处 《计算机研究与发展》 EI CSCD 北大核心 2003年第2期251-257,共7页 Journal of Computer Research and Development
基金 国家自然科学基金 (69872 0 19)
关键词 串空间 安全协议 形式化验证模型 算法 网络安全 信息安全 T模型 计算机网络 security protocols formal verification strand spaces
  • 相关文献

参考文献7

  • 1J C Mitchell, M Mitchell, U Stern. Automated analysis of cryptographic protocols using Mur. In: Proc of the 1997 IEEE Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1997. 141~153
  • 2桑田,黄连生,张磊.改进的加密协议形式化验证模型和算法[J].清华大学学报(自然科学版),2002,42(1):48-51. 被引量:2
  • 3F Thayer, J C Herzog, J D Guttman. Strand spaces: Why is a security protocol correct? In: Proc of 1998 IEEE Symp on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1998
  • 4F Thayer, J C Herzog, J D Guttman. Authentication tests. In: Proc of 2000 IEEE Symp on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2000. 96~109
  • 5F Thayer, J C Herzog, J D Guttman. Protocol independence through disjoint encryption. In: Proc of the 13th IEEE Computer Security Foundations Workshop. Cambridge, England: IEEE Computer Society Press, 2000. 24~34
  • 6D X Song. Athena: A new efficient automated checker for security protocol analysis. In: Proc of the 12th IEEE Computer Security Foundations Workshop. Mordano, Italy: IEEE Computer Society Press, 1999
  • 7G Lowe. A hierarchy of authentication specifications. In: The 10th Computer Security Foundations Workshop Proceedings. Massachusetts, USA: IEEE Computer Society Press, 1997. 31~43

二级参考文献4

  • 1[1]McLean J.Twenty years of formal methods [A].Proceedings of the IEEE Symposium on Security and Privacy [C].USA: IEEE Computer Society Press,1999.115-116.
  • 2[2]Meadows C.Open issues in formal methods for cryptographic protocol analysis [A].DARPA Information Survivability Conf and Expo,DISCEX Proc [C].USA,2000.237-250 [3] Mitchell J,Mitchell M,Stern U.Automated analysis of cryptographic protocols using Murφ [A].Proc IEEE Sym on Security and Privacy [C].USA: IEEE Computer Society Press,1997.141-151.
  • 3[3]Lowe G.Breaking and fixing needham-schroeder public-key protocol using FDR[J].Software-Concepts and Tools,1996,17: 93-102.
  • 4[4]Needham R,Schroeder M.Using encryption for authentication in large networks of computers [J].Commu of ACM,1978,21(12): 993-999.

共引文献1

同被引文献56

引证文献9

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部