• Article
  • | |
  • Metrics
  • |
  • Reference [13]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    In this paper, a cryptographic protocol together with its cryptographic algorithms is regarded as one system, and a security model for the system is built. Based on assume-guarantee compositional reasoning techniques, a new assume-guarantee based reasoning rule and algorithm are proposed, and the soundness of the rule is proved. In realizing model checking to the cryptographic protocol system, several difficulties are solved chiefly such as decomposition of the system, generation of assumed functions, and specifying security properties in forms of both logic formulas and processes. Using this security model and assume-guarantee based reasoning techniques, the kerberos cryptographic protocol system is verified.

    Reference
    [1]Dolev D, Yao A. On the security of public key protocols. IEEE Transactions on Information Theory, 1983,29(2):198~208.
    [2]Mao W, Boyd C. Towards the formal analysis of security protocols. In: Gray J, ed. Proceedings of the Computer Security Foundations Workshop Ⅵ. Los Alamitos: IEEE Computer Society Press, 1993. 147~158.
    [3]Berezin S, Campos S, Clarke EM. Compositional reasoning in model checking. In: Roever W, Langmaack H, Pnueli A, eds. Proceedings of the Workshop COMPOS'97. Berlin Heidelberg: Springer-Verlag, 1997. 81~102.
    [4]Amla WN, Emerson EA, Namjoshi K, Trefler R. Assume-Guarantee based compositional reasoning for synchronous timing diagrams. In: Margaria T, Yi W, eds. Tools and Algorithms for the Construction and Analysis of Systems, 7th International Conference, TACAS 2001. Berlin Heidelberg: Springer-Verlag, 2001. 465~479.
    [5]Liu YW, Li WQ. Hierarchy requirements and verification for cryptographic protocols. Journal of Beijing University of Aeronautics and Astronautics, 2002,28(5):589~592 (in Chinese with English abstract).
    [6]Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed, New York: John Wiley & Sons, Inc., 1996.
    [7]Menezes A, Oorschot PC, Vanstone S. Handbook of Applied Cryptography. New York: CRC Press, 1997.
    [8]Feng DG, Wu WL. The Design and Analysis for Block Ciphers. Beijing: Tsinghua University Press, 2000 (in Chinese).
    [9]Grumberg O, Long D. Model checking and modular verification. ACM Transactions on Programming Languages and Systems, 1994,16(3):843~871.
    [10]Liu YW, Li WQ. The model reasoning verifier for cryptographic protocols. In: Wu ZH, Zhuang YT, He QM, et al., eds. Proceedings of the 6th International Conference for Young Computer Scientist. Beijing: International Academic Publishers, 2001. 290~295.
    [11]Lowe G. A hierarchy of authentication specifications. In: Guttman J, ed. Proceedings of the 10th IEEE Computer Security Foundations Workshop. CA: IEEE Computer Society Press, 1997. 31~43.
    [12]刘怡文,李伟琴.密码协议的分层安全需求及验证.北京航空航天大学学报,2002,28(5):589~592.
    [13]冯登国,吴文玲.分组密码的设计与分析.北京:清华大学出版社,2000.
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

刘怡文,李伟琴,冯登国.密码协议的一种安全模型.软件学报,2003,14(6):1148-1156

Copy
Share
Article Metrics
  • Abstract:4819
  • PDF: 5226
  • HTML: 0
  • Cited by: 0
History
  • Received:May 14,2002
  • Revised:September 04,2002
You are the first2038572Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063