期刊文献+

三方密码协议运行模式分析法 被引量:5

Running-Mode Analysis of the Three-Party Cryptographic Protocol
下载PDF
导出
摘要 在两方密码协议运行模式分析法的基础上 ,利用模型检测的理论结果 ,提出了三方密码协议运行模式分析法 .用这种方法对DavisSwick协议进行了分析 ,成功地验证了此协议的安全性 。 Based on the model checking theory, we derive the running mode analysis method of three party cryptographic protocols from the running mode analysis method of two party cryptographic protocols. To test this method, we use it to analyze the Davis Swick protocol and successfully prove the security of protocol. Therefore, we can draw a conclusion that running mode analysis of three party cryptographic protocol is available.
出处 《中国科学院研究生院学报》 CAS CSCD 2004年第3期380-385,共6页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家自然科学基金项目 ( 60 10 2 0 0 4 60 2 73 0 2 7 60 0 2 5 2 0 5 )资助
关键词 密码协议 形式化分析 模型检测 运行模式分析法 cryptographic protocol, formal analysis, model checking, running-mode analysis
  • 相关文献

参考文献9

  • 1Z Dang, R A Kemmerer. Using the ASTRAL model checker for cryptographic protocol analysis. In: Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols. Available via URL, 1997; http://dimacs. rutgers. edu/Workshops/Securi
  • 2Martin Abadi, Mark R Tuttle. A semantics for a logic of authentication (Extended Abstract). In: Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing. 1991. 201-216
  • 3L Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6:85-128
  • 4Gavin Lowe, A W Roscoe. Using CSP to detect errors in the TMN protocol. IEEE Transactions on Software Engineering,1997, 23(10): 659-669
  • 5Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 1996, 26(2): 113-131
  • 6Yu-Qing ZHANG, Ji-Hong LI, Guo-Zhen XIAO. An approach to the formal verification of the two- party cryptographic protocols. ACM Operating Systems Review, 1999, 33(4): 48-51
  • 7Will Marrero, Edmund Clarke, Somesh Jha. Model checking for security protocols. Technical Report CMU-SCS-97-139, Carnegie Mellon University, 1997
  • 8Gavin Lowe. Towards a completeness result for model checking of security protocols. Journal of Computer Security, 1999, 7(2 -3) :89-146
  • 9J C Mitchell, M Mitchell, U Stern. Automated analysis of cryptographic protocols using Murtψ. In: Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1997. 141-151

同被引文献30

  • 1刘秀英,张玉清,杨波,邢戈.TMN协议的攻击及其分类研究[J].计算机工程,2004,30(16):47-50. 被引量:3
  • 2周贤善,朱光耀,严圣华.SSL协议与SET协议分析[J].湖北民族学院学报(自然科学版),2004,22(4):90-93. 被引量:4
  • 3吴建耀,张玉清,杨波.SET支付协议简化版本的运行模式分析[J].计算机应用研究,2005,22(10):124-127. 被引量:1
  • 4吴建耀,张玉清,杨波.SET支付协议的形式化分析与改进[J].计算机工程,2006,32(3):164-166. 被引量:7
  • 5文扬,彭舰,张磊,尹德辉,李炳法.基于J2ME技术的手机预订机票系统的设计与实现[J].计算机应用研究,2006,23(5):166-168. 被引量:6
  • 6Lu S,Smolka S.Model Checking the Secure Electronic Transaction (SET) Protocol[C].Proceedings of 7th International Symposium on Modeling,Analysis and Simulation of Computer and Telecommunica-tion Systems,1999:358-365
  • 7Panti M,Spalazzi L,Tacconi S.Automatic Verification of Security in Payment Protocols for Electronic Commerce[Z].Enterprise Information Systems IV,Hingham,MA:Kluwer Academic Publishers,2003
  • 8Zhang Yuqing,Li Jihong,Xiao Guozhen.An Approach to the Formal Verification of the Two-party Cryptographic Protocols[J].ACM Operating Systems Review,1999,33(4):48-51
  • 9SMV.http://www.cs.cmu.edu/~modelcheck/
  • 10Tatebayashi M,Matsuzaki N,Newman D B. Key Distribution Protocol for Digital Mobile Communication Systems. In Advancein Cryptology--CRYPTO'89,Springer-Verlag,1989: 324-333

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部