期刊文献+

SET协议模型的改进与SMV分析 被引量:2

Improvement of SET protocol model and formal analysis via SMV
下载PDF
导出
摘要 在以Lu&Smolka对SET协议支付过程的简化模型为研究对象的情况下,进行形式化建模和有限状态机模型。同时应用CTL对相应的安全性质进行形式描述,并在网络环境被入侵者控制的假设下,利用SMV分析了协议的认证性、保密性和完整性,发现攻击并对该攻击所产生的影响进行了讨论。最后修改其协议模型对改进后的协议进行分析和检验,说明了SET协议独具特色的双重签名在整个协议运行中至关重要。 The simplified model of payment process of the SET protocol is used to build up its formal model and finite state machine model,as well as CTL formulations of the security properties are presented.Under the assumption of the network environment being controlled by intruder,the symbolic model checking ware (SMV) is applied for analyzing the authentication, confidentiality and integrity,attacks are found.Then,the influence of attacks is discussed.Finally,the protocol model is optimized. The result of analysis and checking indicates the importance of dual signature on SET protocol.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第8期113-116,共4页 Computer Engineering and Applications
基金 北京市教委科技计划(No.KM200510028016)
关键词 安全电子交易 符号模型验证器 符号模型 模型检测 Secure Electronic Transaction(SET) Symbolic Model Verifier(SMV) symbolic model model checking
  • 相关文献

参考文献7

  • 1Phadke A G,Thorp J S,Adamiak M G.SET secure electronic transaction specification.Boo! 2:Programmer's guide version 1.0[S].1997.
  • 2常亮,古天龙,郭云川.互联网密钥交换协议的SMV分析[J].计算机工程与应用,2005,41(19):154-157. 被引量:6
  • 3龙士工,罗文俊,李祥.密码协议的符号模型检测及分析[J].计算机应用,2005,25(1):138-140. 被引量:3
  • 4Ruiz M C,Cazorla D,Cuartero F,et al.A formal specification and performance evaluation of the purchase in SET protocol[C]//Proceeding of 7th International Symposium and Numeric Algorithms for Scientific Computing(SYNASC'05),2005.
  • 5Lu Shi-yong.Model checking the secure electronic(SET)protocol[C]// Proceeding of 7th International Symposium on Modeling,Analysis and Simulation of Computer and Telecommunication Systems, 1999: 358-365.
  • 6陶玲妹,董荣胜.SET协议支付过程的符号模型检验[J].桂林电子工业学院学报,2005,25(4):1-5. 被引量:3
  • 7Panti M,Spalazzi L,Taccoui S,et al.Automatic verification of security in payment protocols for electronic commerce[M]//Enterprise Information Systems, 2003 : 276-282.

二级参考文献32

  • 1LOWE G. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR[ A]. Proc. of TSCAS'96. Berlin: Springer Verlag[ C], 1996. 147 - 166.
  • 2HOARE CAR. Communicating Sequential Processes[ M]. Prentic-Hall, 1985.
  • 3DANG Z, KEMMERER R. Using the ASTRAL Model Checker for Cryptographic Protocol Analysis[ A]. D1MACS Workshop on Designand Formal Verification of Security Protocols[ C], 1997.
  • 4MARRERO W, CLARKE E, JHA S. A Model checker for Authentication Protocols[ A]. D1MACS Workshop on Design and Formal Verification of Security Protocols[ C], 1997.
  • 5MITECHELL J, MITECHELL M, STERN U. Automated Analysis of Cryptographic Protocols using Mur[ A]. Proc of the IEEE Symposium on Security and Privacy[ C]. USA: IEEE Computer Society Press, 1997. 141 -151.
  • 6SMV[ EB/OL]. http://www-cad. eecs. berkeley. edu/- kenmcmil.
  • 7HOARE CAR. Communicating Sequential Processes[ M]. PrenticHall, 1985.
  • 8DANG Z, KEMMERER R. Using the ASTRAL Model Checker for Cryptographic Protocol Analysis[ A]. DIMACS Workshop on Design and Formal Verification of Security Protocols[ C], 1997.
  • 9MARRERO W, CLARKE E, JHA S. A Model checker for Authentication Protocols[ A]. DIMACS Workshop on Design and Formal Verification of Security Protocols[C], 1997.
  • 10MITECHELL J, MITECHELL M, STERN U. Automated Analysis of Cryptographic Protocols using Mur[ A]. Proc. of the IEEE Symposium on Security and Privacy[ C]. USA: IEEE Computer Society Press, 1997. 141 -151.

共引文献9

同被引文献26

  • 1肖美华,薛锦云.基于SPIN/Promela的并发系统验证[J].计算机科学,2004,31(8):201-203. 被引量:20
  • 2薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 3Lu Shiyong, Smolka S A. Model checking the secure electronic transaction (SET) protocol[C]// Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. 1999:358-365.
  • 4Holzmann G J. The SPIN Model Checker: Primer and Reference Manual[M].Addison-Wesley, 2003.
  • 5Bella G, Massacci F, Paulson L. Verifying the SET registration protocols[J].IEEE Journal on Selected Areas in Communications, 2003,21(1):77-87.
  • 6Ruiz M C, Cazorla D, Cuartero F, et al. Analysis of the SET E-commerce protocol using a true concurrency process algebra[C]// Proceedings of the 2006 ACM Symposium on Applied Computing. 2006:879-886.
  • 7Xiao M H,Wan Z L, Liu H L.The Formal Verification and Improvement of Simplified SET Protocol[J].Journal of Software,2014,9 (9):2302-2308.
  • 8Shen Z H,Wang H.An improved SET protocol payment system[C]//Proc. Conf.on Computer and of International Communication Technologies in Agriculture Engineering Chengdu, China, June 2010.400-403.
  • 9闰婷婷.基于第四方电子商务的统一支付平台及其协议的歼究[D].华南理工大学,2012.
  • 10黎升洪,冯艳清.第三方支付的基于SPIN的形式化分析[J].计算机时代,2008(12):23-25. 被引量:3

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部