【摘 要】
:
The growing interest in the application of formal methods of cryptographic pro-tocol analysis has led to the development of a number of different ways for analy
【机 构】
:
State Key Laboratory of Information Security,Engineering Research Center for Information Security Te
【基金项目】
:
国家杰出青年科学基金;国家自然科学基金;National Key Basic Research Program of China under
论文部分内容阅读
The growing interest in the application of formal methods of cryptographic pro-tocol analysis has led to the development of a number of different ways for analyzing protocol. Inthis paper, it is strictly proved that if for any strand, there exists at least one bundle containingit, then an entity authentication protocol is secure in strand space model (SSM) with some smallextensions. Unfortunately, the results of attack scenario demonstrate that this protocol and the Yahalom protocol and its modification are de facto insecure. By analyzing the reasons of failure offormal inference in strand space model, some deficiencies in original SSM are pointed out. In orderto break through these limitations of analytic capability of SSM, the generalized strand space model(GSSM) induced by some protocol is proposed. In this model, some new classes of strands, oraclestrands, high order oracle strands etc., are developed, and some notions are formalized strictly in GSSM, such as protocol attacks, valid protocol run and successful protocol run. GSSM can thenbe used to further analyze the entity authentication protocol. This analysis sheds light on why thisprotocol would be vulnerable while it illustrates that GSSM not only can prove security protocolcorrect, but also can be efficiently used to construct protocol attacks. It is also pointed out thatusing other protocol to attack some given protocol is essentially the same as the case of using themost of protocol itself.
其他文献
通过对高压电机振动故障的分析,指出了对设备运行效率的影响.在实际工作中采用的查找和处理方法,解决了设备运行中的问题,满足了生产的实际情况.
This paper proposes an algorithm named WLFVC, which is a fully distributed wireless packet scheduling algorithm based on LFVC (Leap Forward Virtual Clock), to p
Polyethylene (PE) grafting 4-vinylpyridine copolymers has been produced as powders of different rushes by the irradiation method. After treatment with methylalu
With the massage passing interface, a parallel solution method was proposed for the simulation of the elliptic mild slope equation, and implemented numerically
In this paper, cavitation damage of turbines is firstly analyzed and predicated from the view point of system engineering by use of the grey system theory. A de
The majority of researches on content-based retrieval focused on visual media.However audio is also an important medium and information carrier from the viewpoi
Rapidly solidified Al87Ni7Cu3Nd3 metallic glasses, prepared by using melt spinning,were treated under both isothermal and non-isothermal regime. The amorphous r
Over the forty-year history of interactive computer graphics, there have been con-tinuous advances, but at some stage this progression must terminate with image
Mining frequent itemsets from large databases has played an essential role inmany data mining tasks. It is also important to maintain the discovered frequent it
本文针对工程机械冬季的维护保养问题进行探讨。
This article discusses the maintenance of construction machinery in winter.