期刊文献+

安全密钥与秘密属性之间关系的研究 被引量:1

Research on Relationship between Safe Keys and Secrecy Property
下载PDF
导出
摘要 在Strand空间中引入理想的概念 ,可以简化安全协议的证明过程 .此外 ,在Strand空间中引入安全密钥的定义 ,可以作为对协议密钥设计要求的描述 .相关文献只给出了理想结构的大致轮廓 ,论文引入新的符号以给出理想结构的内部细节 .在此基础上 ,借助理想的概念重新描述了安全密钥的设计要求 .针对具有密钥分发功能的安全协议的秘密属性 ,相关文献借助理想概念给出的证明过程缺乏直观性 .论文证明 :协议实现其秘密属性的结论等价于协议对于密钥的使用符合安全密钥的设计要求的结论 .这不仅为利用理想概念证明协议秘密属性的抽象过程提供了直观解释 。 Strand spaces model is a kind of formal methods which is applied to security protocol analysis. It offers a concept of ideals which makes its proof procedure of the security protocol simple and clear. In addition, the definition of safe keys is introduced by this method, which can also be viewed as the description of the design requirements of keys used in the protocol. The related literatures only give the outline of the ideals structure. In this papers, new notations are given to describe the inner details of the structure of ideals. Based on these notions, a new description of the design requirements of safe keys is presented with the help of the concept of ideals. For the secrecy of the three party security protocol with the function of the keys distribution, the proof given by the related literatures which makes use of the ideals notion lacks of intuitiveness. We prove that the conclusion that the protocol has fulfilled the property of the secrecy is equal to the conclusion that the way that protocol uses the keys has satisfied the design requirement for safe keys. This not only offers an intuitive interpretation to the abstract procedure which makes use of the ideals notion to prove the protocol secrecy, but also a new way to prove the secrecy property of the protocol.
作者 吕述望 任侠
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2004年第2期234-240,共7页 JUSTC
基金 国家"973"计划 (G1 9990 35 80 0 )
关键词 STRAND空间 安全协议 理想 安全密钥 秘密属性 网络安全 strand spaces security protocols ideal safe keys secrecy
  • 相关文献

参考文献5

  • 1Fabrega F Javier Thayer, Jonathan C Herzog,and Joshua D. Guttman. Strand spaces: Proving security protocols correct [ J ]. Journal of Computer Security, 1999, 7(2,3) : 191-230.
  • 2Fabrega F Javier Thayer, Jonathan C Herzog,and Joshua D. Guttman. Strand space pictures. Workshop on Formal Methods and Security Protocols[C]. 1998.
  • 3Fabrega F Javier Thayer, Jonathan C Herzog,and Joshua D. Guttman Proc 18th IEEE Symposium on Security and Privacy [ C ]. IEEE Computer Society Press, 1998.
  • 4Fabrega F Javier Thayer, Jonathan C Herzog,and Joshua D. Guttman Proc 11th IEEE Computer Security Foundations Workshop[ C].IEEE Computer Society Press, 1998. 66-77.
  • 5Guttman Joshua D, F6brega F Javier Thayer.Authentication tests and the structure of bundles [ J ]. Theoretical Computer Science,2002, 283(2): 333-380.

同被引文献5

  • 1WilliamStallings 刘玉珍 译.密码编码学与网络安全,原理与实践(第三版)[M].北京:电子工业出版社,2004..
  • 2Johnson D, Perkins C, Arkko J. Mobility Support in IPv6[S]. IETF Draft, RFC 3775,2003.
  • 3CHEN Tian-wei, Gunter Schafer, FAN Chang-peng, et al. Denial of service protection for optimized and QoS-aware handover based on localized cookies[A]. Proceedings of 5^th European Wireless Conference [C].Spain, Barcelona, 2004,155-161.
  • 4Francis Dupont, Wassim Haddad. How to make IPsec more mobile IPv6 friendly [S].IETF Draft, draft-dupont-ipsec-mipv6-03, txt,2003.
  • 5Arkko J, Devarapalli V,Dupont E Using IPsec To Protect Mobile IPv6 Signaling Between Mobile Notes and Home Agents [S].IETF Draft, RFC 3776, 2003.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部