期刊文献+

对SVO逻辑方法的改进 被引量:4

Improving SVO logic
下载PDF
导出
摘要 随着移动应用广泛普及,移动通信的安全要求就愈来愈高,而移动设备计算能力相对较低,如何降低移动端的计算量是移动通信的认证密钥协商协议需要解决的问题.为了降低通信中移动端的计算量,很多用于移动设备的身份认证协议采用哈希函数代替签名机制进行身份认证,而SVO逻辑缺乏对哈希函数用于身份认证的形式化描述.因此,扩展了SVO逻辑分析哈希函数的逻辑语法,增加了相应的推理公理,证明了推理公理的安全性.然后,讨论了SVO逻辑方法的分析目标,举例证明了其实体认证目标存在的漏洞,提出新的认证目标,同时分析了新目标的安全性.实验证明,对SVO逻辑方法的扩展与改进是实用和有效的,此工作对其他的安全协议形式化分析方法也具有借鉴意义. Mobile applications are popular, hence secure mobile communication is a necessity. Unfortunately, the computational ability of mobile terminals is relatively low, so it is urgent to reduce the computational complexity of authentication and key agreement protocols in mobile communication. To reduce computational demands, many authentication protocols used in mobile terminals adopt hash functions, instead of signatures, for authentication. Nevertheless, SVO logic lacks a formalized description for authentication of hash functions. This paper proposes extensions to the syntax of SVO logic for the analysis of hash functions, adding corresponding axioms of reasoning (algorithms) and proving its security. Goals of SVO logic are then discussed, showing this method satisfies the default goals in "Entity authentication". Finally, a new authentication goal is proposed, and security of the new goal is analyzed. Practice has proved that expansion and improvement of SVO logic are practical and effective, compared to other security protocols.
作者 吴开贵 陈明
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2007年第5期542-547,共6页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(30400446) 2CNGI示范工程2005年研究开发 产业化及应用试验基金资助项目(发改办高技[2004]2482号)
关键词 哈希函数 SVO逻辑 实体认证 密钥确认 形式化分析 hash function SVO logic entity authentication key confirmation tormalized analysis
  • 相关文献

参考文献14

  • 1BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[J].ACM Transactions in Computer Systems,1990,8(1):18-36.
  • 2VANOORSCHO P C.Extending cryptographic logics of belief to key agreement protocols (extended abstract)[A].In Proceedings of the First ACM Conference on Computer and Communications Security[C].Virginia,USA,1993.
  • 3SYVERSON P F,VANOORSCHO P C.On unified some cryptographic protocol logics[A].In:Proceedings of the 1994 IEEE Computer Society[C].[s.l.],1994.
  • 4SYVERSON P F,VANOORSCHO P C.A unified cryptographic protocol logics[R].Washington:Naval Research lab,1996.
  • 5卿斯汉.一种新型的非否认协议[J].软件学报,2000,11(10):1338-1343. 被引量:21
  • 6王茜,杨德礼.一种基于SVO逻辑的新形式化验证方法[J].计算机集成制造系统-CIMS,2004,10(3):342-351. 被引量:6
  • 7DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
  • 8ISO/IEC 9798-l.International organization for standardization.Information technology-Security techniquesEntity authentication mechanisms[S].Part 1:General model.1991.
  • 9ISO/IEC 9798-3.International Organization for Standardization.Information technology-Security techniquesEntity authentication mechanisms[S].Part 3:Entity authentication mechanisms using a public key algorithm,1993.
  • 10GOLLMANN D.What do we mean by entity authentication[A].In Proceedings of the IEEE Symposium on Security and Privacy[C].Los Alamitos,USA,1996.

二级参考文献23

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2[1]WANG Qian, YANG Deli. The study on atomic electronic cash protocol[A].Proceedings of International Symposium on Future Software Technology[C]. Wuhan: HUST Press,2002.26-29.
  • 3[2]CAMP J, HARKAVY M,TYGAR J D, YEE B. Anonymous atomic transactions[A]. Proceeding of the 2nd Usenix Workshop on Electronic Commerce[C].ACM Press,1996.123-133.
  • 4[3]CAMP J. An atomcity-generating protocol for anonymous currencies[J]. IEEE Transactions on Software Engineering, 2001,27(3):272-278.
  • 5[4]WANG Qian, YANG Deli. The research of dual-mode electronic cash system[A]. Proceedings of 2002 International Conference on Management Science&Engineering[C].Harbin:Harbin Institute of Technology Press,2002.1609-1613.
  • 6[5]BURROWS M, ABADI M, NEEDHAM R M. A logic of authentication[J]. ACM Transacion on Computer System,1990, 8 (1):18-36.
  • 7[6]BURMESTER M. On the risk of opening distributed keys[A]. In Advanced in Cryptology-CRYPTO'94[C]. Berlin: Springer-Verlag, LNCS (839),1994.308-317.
  • 8[7]NEUMAN B C, THEODORE,T S. An authentication service for compute network[J]. IEEE Communication Magazine,1990, 132(9):33-38.
  • 9[8]BOYD C, MAN W. On a limitation of BAN logic[A]. In Advances in Cryptology-Eurocrypt'93, Vol 765 of Lecture Notes in Computer Science[C]. Berlin:Springer-Verlag,1993.240-247.
  • 10[9]MAO W, BORD C. Towards the formal analysis of security protocol[A]. Proc of the Computer Security Foundations Wordshop VI[C].USA:IEEE Computer Society Press,1993.147-158.

共引文献38

同被引文献41

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部