首页 | 本学科首页   官方微博 | 高级检索  
     

Needham-Schroeder 协议的认证测试方法形式化分析
引用本文:李廷元,秦志光,刘晓东,张选芳.Needham-Schroeder 协议的认证测试方法形式化分析[J].计算机工程与应用,2010,46(19):100-102.
作者姓名:李廷元  秦志光  刘晓东  张选芳
作者单位:1.电子科技大学计算机科学与工程学院,成都610054 2.中国民用航空飞行学院计算机学院,四川广汉618307
基金项目:民航局科研基地863项目(the Scientific Research Base of Civil Aviation Administration of China 
摘    要:在安全协议的形式化分析方法中,串空间模型和基于串空间模型的认证测试方法是比较常用的验证方法。针对Needham- Schroeder协议存在中间人攻击的缺陷,提出对协议的改进并采用认证测试方法,验证了改进的协议可以满足协议的安全目标。

关 键 词:安全协议  形式化分析  串空间模型  认证测试方法  Needham-Schroeder  协议
收稿时间:2008-12-16
修稿时间:2009-2-26  

Formal analysis of Needham-Schroeder protocol with authentication test methods
LI Ting-yuan,QIN Zhi-guang,LIU Xiao-dong,ZHANG Xuan-fang.Formal analysis of Needham-Schroeder protocol with authentication test methods[J].Computer Engineering and Applications,2010,46(19):100-102.
Authors:LI Ting-yuan  QIN Zhi-guang  LIU Xiao-dong  ZHANG Xuan-fang
Affiliation:1.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China 2.School of Computer,Civil Aviation Flight University of China,Guanghan,Sichuan 618307,China
Abstract:Among the formalized analysis methods of security protocol,the strand space model and the authentication test methods based on the strand space model are the commonly used methods.For the defects of man-in-middle attack in the Needham-Schroeder protocol,the paper gives the improvements and adopts the authentication test methods to verify the improved Needham-Schroeder protocol can meet the demands of security goals of protocol.
Keywords:security protocol  formal analysis  strand space model  authentication test methods  Needham-Schroeder protocol
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号