• Article
  • | |
  • Metrics
  • |
  • Reference [7]
  • |
  • Related
  • |
  • Cited by [2]
  • | |
  • Comments
    Abstract:

    MSR (multiset rewriting) model is a technique of protocol modeling based on multiset rewriting. According to the results of the current study, this model is not perfect. Since the intruder model of MSR model is not suitable for the verification of the protocol, it was improved. Using this model, the secrecy and authentication of the cryptographic protocols are described. The practice proves the improvement of the former model.

    Reference
    [1]Ji QG,Feng DG.Towards analyzing some kinds of critically formal models for network security protocols.Chinese Journal of Computers,2005,28(7):1071-1083 (in Chinese with English abstract).
    [2]Cervesato I,Durgin NA,Lincoln PD,Mitchell JC,Scedrov A.A meta-notation for protocol analysis.In:Syverson P,ed.Proc.of the 12th IEEE Computer Security Foundations Workshop-CSFW'99.Mordano:IEEE Computer Society Press,1999.55-69.
    [3]Cervesato I.A specification language for crypto-protocols based on multiset rewriting,dependent types and subsorting.In Delzanno G,Etalle S,Gabbrielli M,eds.Proc.of the Workshop on Specification,Analysis and Validation for Emerging Technologies-SAVE'01.Paphos,2001.1-22.
    [4]Cervesato I.Data access specification and the most powerful symbolic attacker in MSR.In:Software Security,Theories and Systems.LNCS 2609,Springer-Verlag,2003.384-416.http://citeseer.ist.psu.edu/cervesato02data.html
    [5]Lowe G.A hierarchy of authentication specifications.In:Proc.of the 10th IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,1997.31-43.
    [6]Cervesato I.Typed MSR:Syntax and examples.In:Proc.of the 1st Int'l Workshop on Mathematical Methods,Models and Architectures for Computer Network Security-MMM 2001.St.Petersburg:Springer-Verlag,2001.159-176.http://citeseer.ist.psu.edu/cervesato01typed.html
    [7]Butler F,Cervesato I.Jaggard A,Scedrov A.A formal analysis of some properties of Kerberos 5 using MSR.Technical Report,MS-CIS-04-04,Philadelphia:University of Pennsylvania,2004.http://theory.stanford.edu/~iliano/by Year.html [1]季庆光,冯登国.对几类重要网络安全协议形式模型的分析.计算机学报,2005,28(7):1071-1083.
    Related
    Comments
    Comments
    分享到微博
    Submit
Get Citation

张畅,王亚弟,韩继红,郭渊博.一种改进的密码协议形式化模型.软件学报,2007,18(7):1746-1755

Copy
Share
Article Metrics
  • Abstract:4177
  • PDF: 5994
  • HTML: 0
  • Cited by: 0
History
  • Received:December 20,2005
  • Revised:April 27,2006
You are the first2038792Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063