期刊文献+

基于概论图灵机的无阈下信道的密码系统定义

Definition of Subliminal-Free Turing Cryptosystems Based on Probabilistic Machine Model
原文传递
导出
摘要 文中通过对具有无阈下信道密码系统定义的研究,指出阻止闽下信道使用的唯一方式是修改密码系统使其具有无阈下性,而且一个参与密码系统运行的主动看守是不可或缺的。在分析了Burmester—Desmedt定义缺点的基础上,基于概论图灵机模型给出了一个新的定义,最后简要讨论了具有无阈下信道密码系统的实现代价。 The research on the definition of subliminal-free cryptosystems shows that the only way to prevent the use of subliminal channels is to modify the eryptosystems and to make them subliminal-free, and an active warden involved in the running of cryptosystems is indispensable. In this paper, the weakness of Burmester-Desmedt' s definition is analyzed, and then a new definition of subliminal-free cryptosystems based on a probabilistic Turing machine model is given. Finally, the cost of designing a complete subliminal- free cryptosystem is discussed.
出处 《信息安全与通信保密》 2009年第8期320-322,326,共4页 Information Security and Communications Privacy
基金 The Subject of State Key Lab of Modern Communications(9140C1107020905) The National Natural Science Foundation of China(60603010) The Subject of State Key Laboratory of Information Security (Graduate School of Chinese Academy of Sciences) (03-06).
关键词 密码学 具有无阂下性的密码系统 概论图灵机 cryptography subliminal-free cryptosystems probabilistic turing machine
  • 相关文献

参考文献11

  • 1Simmons G J. The prisoner' s problem and the subliminal channel[C]//David Chaum. Advances in Cryptology: Proc. of CRYPTO' 83. USA: Plenum Press, 1984:51-67.
  • 2Desmedt Y, Claude Ooutier, Samy Bengio. Special Uses and Abuses of The Fiat-Shamir Passport Protocol[C]//Carl Pomerance. Advances in Cryptology: Proc. of CRYPTO' 87, LNCS 293. Berlin: Springer-Verlag, 1987:21-39.
  • 3Desmedt Y. Subliminal-free Authentication and Signature[C]// Christoph G GUnther. Advances in Cryptology: Proc. of EUROCRYPT' 88, LNCE330. Berlin: Springer-Verlag, 1988:23-33.
  • 4Desmedt Y, Yung M. Unconditional subliminal-freeness in Unconditional Authentication Systems[C]. [s.l.]: IEEE Publications, 1991:176.
  • 5Desmedt Y, Yung M. Minimal cryptosystems and defining subliminal-freeness[C].[s.l.]:IEEE Publications, 1994: 347.
  • 6Mike Burmester, Yvo G. Desmedt, Toshiya Itoh, et al. A Progress Report on Subliminal-Free Channels[C]//Anderson R. Proc. of Information Hiding: First International Workshop. Berlin: Springer Verlag, 1996:157-168.
  • 7Simmons G J. An introduction to the mathematics of trust in security protocols[C]. [s.l.]:IEEE Computer Society Press, 1993:121-127.
  • 8Desmedt Y. Simmons' Protocol is Not Free of Subliminal Channels[C].[s. l.]:IEEE Computer Society, 1996:170-175.
  • 9吴其祥,李祖猛,马华.基于HTTP协议的隐蔽信道研究[J].信息安全与通信保密,2009,31(1):73-74. 被引量:10
  • 10裴勇,沈勇.网络隐蔽通道检测系统模型设计[J].信息安全与通信保密,2009,31(6):78-80. 被引量:2

二级参考文献6

  • 1邹昕光,金海军,郝克成,孙圣和.基于HTTP协议多维随机参数插入通信隐藏算法[J].计算机工程与应用,2006,42(34):127-130. 被引量:6
  • 2D Llamas,A Miller,C Allison.An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP protocol suite[C].In 4th European Conference on Information Warfare and Security (ECIW).2005:207.
  • 3ARix P.Covert channels analysis in TCP/IP networks[J].IFIPS School of Engineering,University of ParisSud XI,Orsay,France.2007:06.
  • 4Smeets M,Koot M.Research Report Covert Channels[J].Research Report for PRI.2006:05.
  • 5Chauhan S.Project Report:Analysis and Detection of Network Covert Channels[J].CMSC 691 IA.2005:08.
  • 6周慧芳,张亚玲,王尚平,谢宁,马宏亮.协议分析与模式匹配相结合的IDS的设计研究[J].信息技术,2007,31(8):14-17. 被引量:5

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部