首页 | 本学科首页   官方微博 | 高级检索  
     

身份认证协议的模型检测分析
引用本文:徐蔚文,陆鑫达.身份认证协议的模型检测分析[J].计算机学报,2003,26(2):195-201.
作者姓名:徐蔚文  陆鑫达
作者单位:上海交通大学计算机科学与工程系,上海,200030
基金项目:国家自然科学基金 ( 6 0 17310 3)资助 .
摘    要:提出一个直观、易用的模型来模拟和验证身份认证协议,并给出基于Spin(模型检测工具)的实现,它不仅可以模拟多对参与者同时进行会话,而且还有效缩减了状态空间,从而避免了以前文献中提到的状态爆炸现象,同时该文用Needham-Schroeder公钥协议和TMN协议来说明如何应用该模型。

关 键 词:身份认证协议  模型检测  分析  伪随机函数  通信协议
修稿时间:2002年3月7日

Model Checking of Authentication Protocols
XU Wei-Wen,LU Xin-Da.Model Checking of Authentication Protocols[J].Chinese Journal of Computers,2003,26(2):195-201.
Authors:XU Wei-Wen  LU Xin-Da
Abstract:The increasing popularity of distributed systems and the emergence of new technologies, such as electronic commerce, demand new security solutions. The corresponding cornerstone of security is often authentication, therefore easy to use methods and tools for modeling and verification of authentication are needed. This paper develops a way of verifying authentication protocols using model checking. Model checking has been proven to be a very useful technique for verifying hardware designs. By modeling circuits as finite-state machines, and exploring all possible execution traces, model checking can find a number of errors in real world designs. Like hardware designs, authentication protocols are very subtle, and can also have bugs which are difficult to find. Specially, this paper presents a simpler model for modeling and verifing authentication protocols, which not only adapts to the situation with multi-pairs of participants but also efficiently reduces the sizes of the state space and avoids states explosion problem mentioned in previous literatures. Also this paper implements the model using Model Checker Spin. Needham-Schroeder Public Key protocol and TMN protocol examples are illustrated to show how this framework is applied.
Keywords:authentication  model checking  Spin
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号