首页 | 本学科首页   官方微博 | 高级检索  
     

基于攻击者行为能力的SVO协议分析
引用本文:刘志猛.基于攻击者行为能力的SVO协议分析[J].计算机工程,2011,37(12):127-129.
作者姓名:刘志猛
作者单位:山东工商学院计算机科学与技术学院,山东烟台,264005
基金项目:国家自然科学基金资助项目
摘    要:SVO原逻辑不适用于证明基于证书的认证与密钥交换协议安全性问题。为此,提出2个SVO逻辑相关公理,对证书真实性与会话密钥安全性进行判断及验证,并结合Dolev-Yao安全模型,从攻击者行为能力的角度评估密码协议的安全性。经分析证明Mangipudi协议未能提供前向安全且存在假冒攻击的安全缺陷,因此给出一个在Dolev-Yao安全模型下可证明安全的解决方案。

关 键 词:安全协议  SVO逻辑  攻击者行为能力  认证协议
收稿时间:2010-11-10

Analysis of SVO Protocol Based on Attacker Behavior Capability
LIU Zhi-meng.Analysis of SVO Protocol Based on Attacker Behavior Capability[J].Computer Engineering,2011,37(12):127-129.
Authors:LIU Zhi-meng
Affiliation:LIU Zhi-meng (School of Computer Science and Technology,Shandong Institute of Business and Technology,Yantai 264005,China)
Abstract:According to the fact that SVO logic lacks relative axioms of judging and verifying the validity of certificates and the security proof of authenticaled exchange protocols, this paper advices to estimate the protocols security from the aspect of ability of attackers by combining Dolev-Yao threat model with the extension of SVO logic which proves that Mangipudi protocol is not immune from impersonation attack and has no the security property of forward secrecy. Then a provable security scheme which overcomes all above flaws in the Dolev-Yao threat model is orooosed.
Keywords:secure protocol  SVO logic  attacker behavior capability  authentication protocol
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号