期刊文献+

密码协议的SPIN建模和验证 被引量:4

Modeling and Verifying Cryptographic Protocols Using SPIN
下载PDF
导出
摘要 为了将模型检测这种强有力的系统验证技术应用于网络协议的安全分析,形式化建模仍然是目前的关键问题和难点所在.本文提出了一种基于高级过程描述语言的建模方法.根据入侵者角色和攻击目标的不同,从入侵者的角度分析协议的运行模式,为每个主体建立过程模型,用模型检测工具进行分析验证.对BAN-Yahalom协议的SPIN分析验证了这种方法的可行性.该方法具有一定的通用性,对其它网络协议的分析有很好的参考价值. In order to use the strong system verification technology model checking in the security property analysis of network protocols,formal modeling method is still the critical problem. In this paper, a modeling method based on a high-level process description language is presented According to the categorizing based on intruders' objectives and roles, we analyze the running mode of protocols from the point of view of the intruders, constructing individual process specification for each principal, then verify them using model checking tools. The analysis of the BAN-Yahalom protocol illustrates the feasibility of the approach. This approach has some generality, and provids a good reference for analysis of other network protocols.
出处 《电子学报》 EI CAS CSCD 北大核心 2002年第12A期2099-2101,共3页 Acta Electronica Sinica
基金 国家高性能计算基金(No.00215)
关键词 密码 验证 模型检测 BAN-Yahalom协议 SPIN 计算机网络 model checking BAN-Yahalom protocol SPIN
  • 相关文献

同被引文献25

  • 1龙士工,王巧丽,李祥.密码协议的Promela语言建模及分析[J].计算机应用,2005,25(7):1548-1550. 被引量:11
  • 2董荣胜,郭云川,古天龙.一种电子商务协议原子性的模型检验分析方法[J].计算机科学,2005,32(4):184-186. 被引量:2
  • 3余云霞.Linux进程调度策略分析.电脑知识与技术,2008,4(2):497-498.
  • 4GERARD J H. The model checker SPIN[ EB/OL]. [ 2009 -02 - 11]. http://spinroot. com/spin/Doc/ieee97. pdf.
  • 5CHRISTEL B, KATONERN J P. Principles of model checking[ M]. Cambridge: MITPress, 2008.
  • 6Zhou J, Gollmann D. A fair non-repudiation protocol. In: IEEE Computer Society Symposium on Research in Security and Privacy, 1996. 55~61.
  • 7Zhou J, Gollmann D. Towards verification of non-repudiation protocols. In: Proc. of 1998 Intl. Refinement Workshop and Formal Methods Pacific, 1998. 370~380.
  • 8Schneider S. Verifying authentication protocols with CSP. In:IEEE Computer Security Foundations Workshop, IEEE, 1997.
  • 9Sigrid , Rudolph C. Security Analysis of (Un-) Fair Non-repudiation Protocols. In: Formal Aspects of Security ( FASec' 02 )Springer Verlag, LNCS, 2002, 2629:97~114.
  • 10Maggi P, Sisto R. Using SPIN to Verify Security Properties of Cryptographic Protocols. In: SPIN'2002 Workshop, 2002.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部