首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于攻击序列求解的安全协议验证新算法
引用本文:韩进,谢俊元. 一种基于攻击序列求解的安全协议验证新算法[J]. 计算机科学, 2010, 37(9): 32-35
作者姓名:韩进  谢俊元
作者单位:南京大学计算机软件新技术国家重点实验室,南京,210093
基金项目:国家自然科学基金,江苏省高新技术计划 
摘    要:基于完美加密机制前提及D-Y攻击者模型,指出注入攻击是协议攻击者实现攻击目标的必要手段.分析了注入攻击及其形成的攻击序列的性质,并基于此提出了搜索攻击序列的算法,基于该算法实现了对安全协议的验证.提出和证明了该方法对于规则安全协议的搜索是可终止的,并通过实验实现了NS公钥协议的验证.实验结果表明,与OFMC等同类安全协议验证工具相比,该算法不仅能实现安全协议验证自动化,而且由于规则安全协议验证的可终止性,使得本算法更具实用性.

关 键 词:安全协议验证  攻击序列求解  自动化

New Security Protocol Verification Approach Based on Attack Sequence Solving
HAN Jin,XIE Jun-yuan. New Security Protocol Verification Approach Based on Attack Sequence Solving[J]. Computer Science, 2010, 37(9): 32-35
Authors:HAN Jin  XIE Jun-yuan
Affiliation:(State Key Laboratory for Novel Software Technology,Nanjing University, Nanjing 210093,China)
Abstract:With the premises of the prefect encryption mechanism and the ICY attacker model, it concluded that the inject attack is the necessarily method for attackers to realize their aims. In this paper, the attributes of inject attack and attack sequences which come from inject attacks were analyzed. Based on those conclusions,it presented an algorithm to determine whether there is an attack sequence in a security protocol. And an new security protocol automatic verification approach was brought up based on this algorithm It was also proved that the algorithm can be terminated in the verificanon process for a regular security protocol. In the paper, the NSPK was verified by the algorithm The experimental results show that compared with other security protocol verification tools, as OFMC, the algorithm can not only realize security protocol automatic verification, but also more practicability for it can be terminated in regular protocol verification process.
Keywords:Security protocol verification   Attack sequence solving   Automatic
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号