首页 | 本学科首页   官方微博 | 高级检索  
     

分析安全协议密码系统相关缺陷的模态逻辑方法
引用本文:毛晨晓,罗文坚,王煦法.分析安全协议密码系统相关缺陷的模态逻辑方法[J].小型微型计算机系统,2006,27(7):1223-1228.
作者姓名:毛晨晓  罗文坚  王煦法
作者单位:中国科学技术大学,计算机科学与技术系,安徽,合肥,230027
摘    要:安全协议未采用适当的密码系统来实现,会使最终的安全协议存在密码系统相关缺陷.对该类缺陷进行形式化分析时,不能使用完善的密码系统假设,这是安全协议形式化分析研究中的一个难点,以CKT5逻辑为基础,以对称密码算法为重点,将序列密码算法和分组密码算法的特性,以逻辑推理规则的形式引入到CKT5逻辑框架中,使得扩展后的逻辑能够用于分析安全协议密码系统相关缺陷,并用实例说明了如何使用扩展逻辑来分析密码系统相关缺陷.

关 键 词:安全协议  形式化分析  模态逻辑  CKT5逻辑  密码系统相关缺陷
文章编号:1000-1220(2006)07-1223-06
收稿时间:03 22 2005 12:00AM
修稿时间:2005-03-22

Model Logic Approach for Analyzing the Flaws of Security Protocol Cryptosystem-related Flaws
MAO Chen-xiao,LUO Wen-jian,WANG Xu-fa.Model Logic Approach for Analyzing the Flaws of Security Protocol Cryptosystem-related Flaws[J].Mini-micro Systems,2006,27(7):1223-1228.
Authors:MAO Chen-xiao  LUO Wen-jian  WANG Xu-fa
Affiliation:Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China
Abstract:A security protocol implemented with an improper cryptosystem may have cryptosystem-related flaws. It is difficult to analyze this kind of flaws because the perfect encryption hypothesis cannot be used. CKT5 logic is extended. Focused on the symmetric key cryptography ,the properties of the stream cipher and the block cipher are introduced into the logical framework of CKT5 in the form of logical inference rules, which make the extended logic to be capable to analyze the cryptosystem-related flaws. An examole is given to illustrate how to use the extended logic to analyze the cryptosystem-related flaws.
Keywords:security protocol  formal analysis  modal logic  CKT5 logic  cryptosystem-related flaws
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号