Volume 28 Issue 5
May  2002
Turn off MathJax
Article Contents
LIU Yi-wen, LI Wei-qin. Hierarchy Requirements and Verification for Cryptographic Protocols[J]. Journal of Beijing University of Aeronautics and Astronautics, 2002, 28(5): 589-592. (in Chinese)
Citation: LIU Yi-wen, LI Wei-qin. Hierarchy Requirements and Verification for Cryptographic Protocols[J]. Journal of Beijing University of Aeronautics and Astronautics, 2002, 28(5): 589-592. (in Chinese)

Hierarchy Requirements and Verification for Cryptographic Protocols

  • Received Date: 23 Apr 2001
  • Publish Date: 31 May 2002
  • The security requirements for cryptographic protocols were divided into shallow requirements and deep requirements. The hierarchy security requirements were illustrated. Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols. A model of computation was developed by modifying and extending the Abadi and Tuttle model, combining BAN logic and the NRL Protocol Analyzer. Using this model and theorem proving techniques, the formal requirements of the Otway-Rees protocol was verified.

     

  • loading
  • [1] Roscoe A W. Intensional specifications of security protocols . In:Guttman J, ed. Proceedings of 9th IEEE Computer Security Foundations Workshop . Los Alamitos:IEEE Computer Society, 1996. 28~38. [2]Boyd C. Towards extensional goals in authentication protocols .http://dimacs.rutgers.edu/workshops/security/program2/program.html,1997. [3]Paulson L C. The inductive approach to verifying cryptographic protocols[J]. Journal of Computer Security, 1998, 6(1/2):85~128. [4]Abadi M, Tuttle M R. A semantics for logic of authentication . In:Proceedings of the 10th ACM Symposium on Principles of Distributed Computing . New York:ACM Press, 1991. 201~216. [5]Meadows C. A model of computation for the NRL protocol analyzer . In:Gong L, ed. Proceedings of Computer Security Foundations Workshop VII .Los Alamitos:IEEE Computer Society Press, 1994. 84~89. [6]Syverson P F. Adding time to a logic of authentication . In:Sandhu R, ed. Proceedings of the First ACM Conference on Computer and Communications Security . New York:ACM Press, 1993. 97~101.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2750) PDF downloads(904) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return