期刊文献+

基于时延Petri网的密码协议分析及性能评估 被引量:1

Analysis and Performance Evaluation of Cryptographic Protocol Using Timed Petri Net
下载PDF
导出
摘要 形式化分析方法由于其精炼、简洁和无二义性逐步成为分析密码协议的一条可靠和准确的途径,但是密码协议的形式化分析研究目前还不够深入,针对这一现状,该文提出用时延Petri网来表示和分析密码协议。该模型不但能够反映协议的静态和动态的特性,而且能够对密码协议进行时间、空间上的性能评估。作为实例,文章对MSR无线协议作了详细的形式分析和性能评估。最后,与其它形式化分析密码协议的方法作了比较。 In order to develop a unified theory to verify cryptographic protocol,this paper provides a way to describe cryptographic protocol based on timed Petri net.This method not only specifies the static and dynamic properties but al-so evaluates the performance of cryptographic protocol(mainly time delay and software complexity).Applying this method to the MSR wireless protocol,this paper verifies the known attacks on it and points out several attacking scenarios.Comparing with relevant ones,it is a better formal way to represent cryptographic protocol.
作者 张广胜
出处 《计算机工程与应用》 CSCD 北大核心 2003年第30期158-161,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助课题(编号:60173053)
关键词 密码协议 形式化分析 时延PETRI网 BAN逻辑 认证协议 cryptographic protocol,formal analysis,timed Petri Net,BAN,authentication protocol
  • 相关文献

参考文献2

二级参考文献4

共引文献15

同被引文献9

  • 1Gupta V,Gupta S.Securing the wireless internet[J].IEEE Communications Magazine,2001 ;39(12):68~75
  • 2Shim Kyungah.Cryptanalysis of mutual authentication and key exchange for low power wireless communications[J].IEEE Communications Letters,2003 ;7(5):248~250
  • 3Ng Siaw-Lynn,Mitchell Chris.Comments on mutual authentication and key exchange protocols for low power wireless communications[J].IEEE Communications Letters,2004;8(4):262~263
  • 4McMillan KL.Symbolic model checking[D].PhD thesis.University of Carnegie Mellon,Pittsburgh,USA,1992
  • 5Whe Dar Lin,Jinn-Ke Jan.A wireless based authentication and anonymous channels for large scale area[C].In:the 6th IEEE Symposium on Computers Communications,Hammamet,2001:36~41
  • 6Wong Duncan S,Chan Agnes H.Mutual authentication and key exchange for low power wireless communications[C].In:Proceeding of Military Communications for Network-Centric Operations Conference,McLean,2001:39~43
  • 7N Agray,W van der Hoek,E de Vink.On BAN logics for industrial security Protocols[C].In:From Theory to Practice in Multi-Agent Systems,LNAI 2296,2001:29~38
  • 8Kim I1-Gon,Choi Jin-Young.Formal verification of PAP and EAPMD5 protocols in wireless networks:FDR model checking[C].In:Proceedings of the 18th International Conference on Advanced Information Networking and Applications,Fukuoka,2004:29~31
  • 9张玉清,王磊,肖国镇,吴建平.Needham-Schroeder公钥协议的模型检测分析[J].软件学报,2000,11(10):1348-1352. 被引量:29

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部