首页 | 本学科首页   官方微博 | 高级检索  
     

密码协议的SPIN建模和验证
引用本文:邵晨曦,胡香冬,熊焰,蒋凡. 密码协议的SPIN建模和验证[J]. 电子学报, 2002, 30(Z1): 2099-2101
作者姓名:邵晨曦  胡香冬  熊焰  蒋凡
作者单位:中国科学技术大学计算机科学技术系, 安徽合肥, 230027
基金项目:国家高性能计算基金,00215,
摘    要:为了将模型检测这种强有力的系统验证技术应用于网络协议的安全分析,形式化建模仍然是目前的关键问题和难点所在.本文提出了一种基于高级过程描述语言的建模方法.根据入侵者角色和攻击目标的不同,从入侵者的角度分析协议的运行模式,为每个主体建立过程模型,用模型检测工具进行分析验证.对BAN-Yahalom协议的SPIN分析验证了这种方法的可行性.该方法具有一定的通用性,对其它网络协议的分析有很好的参考价值.

关 键 词:模型检测  BAN-Yahalom协议  SPIN  
文章编号:0372-2112(2002)12A-2099-03
收稿时间:2002-05-28
修稿时间:2002-05-28

Modeling and Verifying Cryptographic Protocols Using SPIN
SHAO Chen-xi,HU Xiang-dong,XIONG Yan,JIANG Fan. Modeling and Verifying Cryptographic Protocols Using SPIN[J]. Acta Electronica Sinica, 2002, 30(Z1): 2099-2101
Authors:SHAO Chen-xi  HU Xiang-dong  XIONG Yan  JIANG Fan
Affiliation:Department of Computer Science and Technology, University of Science and Technology of China, Hefei, Anhui 230027, China
Abstract:In order to use the strong system verfication technology model checking in the security property analysis of network protocols, formal modeling method is still the critical problem. In this paper, a modeling method based on a high-level process descriplion language is presented According to the categorizing based on intruders'objectives and roles,we analyze the running mode of protocols from the point of view of the intruders, constructing individual process specification for each principal, then verify them using model checking tools.The analysis of the BAN-Yahalom protocol illustrates the feasibility of the approach. This approach has some generality,and provids a good reference for analysis of other network protocols.
Keywords:SPIN
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号