An Attack on Digital Signature Protocol Based on Intruder's Role Impersonate
DOI:
Author:
Affiliation:
Clc Number:
Fund Project:
Article
|
Figures
|
Metrics
|
Reference
|
Related
|
Cited by
|
Materials
|
Comments
Abstract:
Security protocols play more and more important role with the bursting development of Internet. Formal authentication is an effective way to detect flaws in those protocols. There are many automatic checkers for verifying protocols, but few can deal with digital signature protocols. This paper proposes a new tool for formal automatic verifying. It can have an effective check for digital signature protocols. It is based on intruder's role impersonate and backward deduction. It was implemented by using JAVA.
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.