A Novel Approach to Automatic Security Protocol Analysis Based on Authentication Event Logic

来源 :Chinese Journal of Electronics | 被引量 : 0次 | 上传用户:lhl23
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Since security protocols form the cornerstones of modern secure networked systems, it is important to develop informative, accurate, and deployable approach for finding errors and proving that protocols meet their security requirements. We propose a novel approach to check security properties of cryptographic protocols using authentication event logic. Compared with logic of algorithm knowledge, authentication event logic guarantees that any well-typed protocol is robustly safe under attack while reasoning only about the actions of honest principals in the protocol. It puts no bound on the size of the principal and requires no state space enumeration and it is decidable. The types for protocol data provide some intuitive explanation of how the protocol works. Our approach has led us to the independent rediscovery of flaws in existing protocols and to the design of improved protocols. Since security protocols form the cornerstones of modern secure networked systems, it is important to develop informative, accurate, and deployable approach for finding errors and proving that protocols meet their security requirements. We propose a novel approach to check security properties of cryptographic protocols using authentication Compared with logic of algorithm knowledge, authentication event logic guarantees that any well-typed protocol is robustly safe under attack while reasoning only about about the actions of honest principals in the protocol. It puts no bound on the size of the principal and requires no state space enumeration and it is decidable. The types for protocol data provide some intuitive explanation of how the protocol works. Our approach has led us to the independent rediscovery of flaws in existing protocols and to the design of improved protocols.
其他文献
林林每天早上一起床就咳嗽,咳了几分钟就缓解了,白天又不怎么咳,这种状态维持了一个多月,将近两个月了.林林妈非常着急.之前以为是感冒,可是吃了很多感冒药,还是不见好转.到
期刊
期刊
松下电器最新推出了具备高保真扩音及听觉效果的高品质会议系统--WM系列.rn该系统配备了超高精度语言切换装置,拥有良好的听觉效果.传声器单元采用了独有的2次指向性ECM传声
二氧化钛的生产方法包括:(a)用硫酸浸取钛铁矿石,得到硫酸钛溶液;(b)从上述溶液中沉淀出水合二氧化钛,矿石中的铁为二价铁,如果需要,向溶液中加入一定量还原剂还原可能存在的三价铁
单电子存储器是依据库仑阻塞原理操纵单个电子进行信息存储的一种量子器件。它具有低功耗、高速度、极小尺寸的优点,是现有存储器极有希望的替代品。信息的记忆性能是衡量存
The malicious computer code immune system and the biological immune system are highly similar:both preserve the stability of the system in real time in a consta
提出了利用胶片特性曲线和计算机辅助设计进行曝光曲线制作的一种新方法。该方法与传统方法相比具有速度快、精度高、节约材料等特点 ,并且可以对不同的工艺条件进行曝光曲线
经分析,X射线数字化实时成像检测技术在天然气长输钢制管道对接焊缝探伤应用是可行的,并能取得良好的经济效益和社会效益,建议在“西气东输”工程中采用。 After analysis,
方法特点:无水锑酸锌溶液(I)由表面改性的无水锑酸锌胶体粒子(Ⅱ)用分散液分散制成。(Ⅱ)以无水锑酸锌胶粒为核心表面涂覆含硅物质(Ⅲ)。溶液(I)中含胺和/或羟基羧酸。rn 详细