期刊文献+

安全协议的形式化描述和分析 被引量:2

Formal Description and Analysis of Security Protocols
下载PDF
导出
摘要 Security protocols use cryptography system to complete the tasks of principal identity authentication andseccion key distribution. The correctness of security protocols is of vital importance to ensure the security of the Inter-net application. Formal methods have been proved to be a valid approach to analyze and verify security protocols. Thispaper briefly introduces the three main styles in the field of security protocol analysis and their representative work.After that,it points out the future deveopment direction. Security protocols use cryptography system to complete the tasks of principal identity authentication and seccion key distribution. The correctness of security protocols is of vital importance to ensure the security of the Internet application. Formal methods have been proved to be a valid approach to analyze and verify security protocols. This paper briefly introduces the three main styles in the field of security protocol analysis and their representative work. After that,it points out the future deveopment direction.
出处 《计算机科学》 CSCD 北大核心 2003年第8期24-27,36,共5页 Computer Science
基金 国家自然科学基金(90104026) 国家863计划(2002AA144040) 高等学校重点实验室访问学者基金
关键词 计算机网络 安全协议 形式化描述 通信协议 信念逻辑 Seciruty protocols,Security,Formal anaylsis,Belief logic,Model checking
  • 相关文献

参考文献17

  • 1Meadows C A. Formal Verification of Cryptographic Protocols : A Surver.
  • 2Meadows C. Open Issues in Formal Methods for Cryptographic Protocol Analysis.
  • 3Abadi M,Burrows M,Needham R. A Logic of Authentication. In; Proc. of the Royal Society,Series A,426,1871,Dec. 1989. 233-271. Also appeared as SRC Research Report 39 and ,in a shortened form,in ACM Transactons on Computer Systems, 1990,8 : 18-36.
  • 4Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols. In :IEEE Computer Society Symposium in Security and Privacy. IEEE Computer Society Press, May 1990. 234-248.
  • 5Abadi M, Tuttle M R. A Semantics for a Logic of Authencation CExtended Abstract). In:Proc. of the 10^th Annual ACM Symposium on Principles of Distributed Computing, Aug. 1991.201-216.
  • 6Syverson P F,van Oorschot P C. On Unifying Some Cryptographic Protocol Logics. In: Proc. of the 1994 IEEE Computer Security Symposium on Security and Privacy, IEEE Computer Society Press, 1994. 14-28.
  • 7Dolev D,Even S,Karp R. On the Security of Public Key Protocols. IEEE Transactions on Information Theory, 1983,29 (2) : 198-208.
  • 8Woo T W,C,Lam S S. A Semantic Model for Authentication Protocols. In:Proc IEEE Symposium on Research in Security and Privacv.IEEE Comouter Society Press ,Mav 1993. 178-194.
  • 9Woo T Y C, Lain S S. Verifying Authentication Protocols: Methodology and Example. In :Proc Intl Cord on Network Protocols,Oct. 1993.
  • 10Ryan P, Schneider S. Modelling and analysis of Security protocols Addison-Wesley Press ,2001.

同被引文献20

  • 1Buttyan L, Vajda I. Towards provable security for Ad hoc rou- ting protocols[C]//Proc of SASN' 04. Washington IX;, USA, 2004:94-105.
  • 2Burrows M, Abadi M, Needham R. A logic of authentication[C]. ACM Transactions in Computer Systems, 1990,8 ( 1 ) : 18-36.
  • 3Wang Ying long, Wang Ji-zhi. The Security Analysis for Ad hoc Routing Protocols Based on Improved Strand Space [C]// SP- CA06: 1st International Symposium on Pervasive Computing and Applications. 2006 (1) : 585-588.
  • 4Fdbrega F J T, Herzog J C, Guttman J D. Strand spaces: Why is a security protocol correct? [C]// Proc. of the 1998 IEEE Syrup. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998:160-171.
  • 5Faibrega F J T, Herzog J C, G uttman J D. Strand spaces~ Proving security protocols correct[J]. Journal of Computer Security, 1999,7(2/3) : 191-230.
  • 6Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security, 1998,6 (1) : 85-128.
  • 7Guttman J D, Fdbrega F J T. Authentication tests[C]// Proc. of the 2000 IEEE Syrup. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2000 : 96-109.
  • 8Guttman J D, Fdbrega F J T. Authentication tests and the struc ture of bundles [J]. Theoretical Computer Science, 2002, 283 (2):333-380.
  • 9Perkins C E,Royer E M. Ad-hoc on demand distance vector rou ting[C]// Proc. of the 2nd IEEE Workshop on Mobile Compu- ting Systems and Applications. New Orleans, 1999:90-100.
  • 10Johnson D B, Maltz D A, Hu Y (2. The dynamic source routing protocol for mobile Ad-hoc networks (DSR)[EB/OL]. IETF MANET Working Group. http://www, ietf. org/internet- drafts/draft ietf-manet-dsr-10, txt,2004.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部