Needham-Schroeder公钥协议的模型检测分析
作者:
基金项目:

本文研究得到国家自然科学基金(No.69673025)资助.

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [1]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    密码协议安全性的分析是当前网络安全研究领域的一个世界性难题.提出了运用模型检测工 具SMV(symbolic model verifier)分析密码协议的方法,并对著名的Needham-Schroeder(NS )公钥协议进行了分析.分析结果表明,入侵者可以轻松地对NS公钥协议进行有效攻击,而这个 攻击是BAN逻辑分析所没有发现过的.同时,给出了经SMV分析过的一个安全的NS公钥协议 的改进版本.

    Abstract:

    It is an important and hard problem in the area of computer network security to analyze cryptographic protocols. A methodology is presented using a model checke r of formal methods, SMV (symbolic model verifier), to analyze the well known Ne edham-Schroeder Public-Key Protocol. The SMV is used to discover an attack upo n the protocol, which has never been discovered by BAN logic. Finally, the proto col is adapted, and then the SMV is used to show that the new protocol is secure.

    参考文献
    1  Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transac tions on Computer Systems, 1990,8(1):18~36 2  Boyd C, Mao W. On a limitation of BAN logic. In: Helleseth T ed. Advances in Cryptology——EUROCRYPT'93. Berlin: Springer-Verlag, 1993. 240~247 3  Zhang Yu-qing, Li Ji-hong, Xiao Guo-zhen. BAN logic for cryptographic protocols analysis and its limitations. Journal of Xidian University, 1999,26(3):376~378 (张玉清,李继红,肖国镇.密码协议分析工具——BAN逻辑及其缺陷.西安电子科技大学学报,1 999,26(3):376~378) 4  Dang Z, Kemmerer R. Using the ASTRAL model checker for cryptographic pr otocol analysis. In: DIMACS Workshop on Design and Formal Verification of Securi ty Protocols. 1997. http://dimacs.rutgers.edu/Workshops/Security/program2/progra m.html 5  Lowe G, Roscoe A. Using CSP to detect errors in the TMN protocol. IEEE Transa ctions on Software Engineering, 1997,23(10):659~669 6  Marrero W, Clarke E, Jha S. A model checker for authentication protocols. In: DIMACS Workshop on Design and Formal Verification of Security Protocols. 1997. http://dimacs.rutgers.edu/Workshops/Security/program2/program.html 7  Mitchell J, Mitchell M, Stern U. Automated analysis of cryptographic protocol s using Murφ. In: Storms P ed. Proceedings of the IEEE Symposium on Security an d Privacy. Los Alamitors, CA: IEEE Computer Society Press, 1997. 141~151 8  SMV. http://www.cs.cmu.edu/~modelcheck/ 9  Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978,21(12):993~999
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

张玉清,王磊,肖国镇,吴建平. Needham-Schroeder公钥协议的模型检测分析.软件学报,2000,11(10):1348-1352

复制
分享
文章指标
  • 点击次数:4588
  • 下载次数: 5444
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:1999-01-22
  • 最后修改日期:1999-09-07
文章二维码
您是第19867784位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号