期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Towards the Idealization Procedure of BAN-Like Logics 被引量:2
1
作者 CAOLi-li CHENKe-fei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期214-218,共5页
We demonstrate the flaws of Mao's method, which is an augmentation ofprotocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao'smethod. Furthermore, we give some theoret... We demonstrate the flaws of Mao's method, which is an augmentation ofprotocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao'smethod. Furthermore, we give some theoretical analysis of our rules using the strand spaceformalism, and show the soundness of our idealization rules under strand spaces Some examples onusing the new rules to analyze security protocols are also concerned. Our idealization method ismore effective than Mao's method towards many protocol instances, and is supported by a formalmodel. 展开更多
关键词 security protocols BAN logic IDEALIZATION strand spaces
下载PDF
Novel analysis and improvement of Yahalom protocol 被引量:1
2
作者 CHEN Chun-ling YU Han +1 位作者 LU Heng-shan WANG Ru-chuan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第2期80-83,共4页
The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a nove... The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protoeol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed. 展开更多
关键词 strand spaces BAN-Yahalom protocol IDEAL minimal element
原文传递
Analysis of security protocols based on challenge-response 被引量:1
3
作者 LUO JunZhou YANG Ming 《Science in China(Series F)》 2007年第2期137-153,共17页
Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the e... Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods, which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques, in which secrecy analysis is split into two parts: Explicit-lnformaUon-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand pa- rameters. This new method owns both the power of the Strand Space Model and concision of authentication logic. 展开更多
关键词 network security protocol analysis challenge-response strand Space Model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部