首页 | 本学科首页   官方微博 | 高级检索  
     

安全协议的形式化分析技术与方法
引用本文:薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20.
作者姓名:薛锐  冯登国
作者单位:中国科学院软件研究所信息安全国家重点实验室,北京,100080;中国科学院软件研究所信息安全国家重点实验室,北京,100080
摘    要:对于安全协议的形式化分析方法从技术特点上做了分类和分析.对于安全协议分析技术的发展历史、目前的状况以及将来的趋势作了总体的介绍和总结.根据作者的体会,从纵向和横向两个角度进行了总结.纵向方面主要是从用于分析安全协议的形式化方法的出现和发展的历史角度加以总结.横向方面主要从所应用的技术手段、技术特点入手,进行总结分析.说明了目前协议形式化分析发展的主要方向.对于目前国际流行的方法和模型进行了例解.

关 键 词:安全协议  形式化分析  安全目标  Dolev-Yao模型  密码学可靠性
收稿时间:2005-10-10
修稿时间:2005-10-10

The Approaches and Technologies for Formal Verification of Security Protocols
XUE Rui,FENG Deng-Guo.The Approaches and Technologies for Formal Verification of Security Protocols[J].Chinese Journal of Computers,2006,29(1):1-20.
Authors:XUE Rui  FENG Deng-Guo
Affiliation:State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080
Abstract:The formal methods for verifying security protocols are classified and analyzed from technological points of view.Authors survey the developing history of analyzing approaches and techniques on security protocols;describe the current status,as well as point out the tendency of them.This work comes from authors' personal research interesting,and it processes in two different lines: The first line follows the trace of emergence and developments of formal methods in verification of security protocols.The other line is to analyze the features when concrete systems are used during verification.The most popular methods and systems are briefly introduced by examples.
Keywords:secure protocol  formal analysis  security goal  Dolev-Yao model  cryptographic reliability
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号