首页 | 本学科首页   官方微博 | 高级检索  
     

分析安全协议猜测攻击的模态逻辑方法
引用本文:毛晨晓,罗文坚,王煦法.分析安全协议猜测攻击的模态逻辑方法[J].计算机学报,2007,30(6):924-933.
作者姓名:毛晨晓  罗文坚  王煦法
作者单位:中国科学技术大学计算机科学与技术系,合肥230027
摘    要:以CKT5逻辑为基础,对其进行了多方面重要的扩展;在原有对称密钥机制的基础上,增加了公开密钥机制和vernam加密机制以增强其描述协议的能力;打破完善加密假设,给出了一组定义和规则使主体具备猜测和验证口令的能力;给出了与在线猜测攻击相关的定理以反映在线猜测攻击的特点;通过相关引理和定理的证明,简化了猜测攻击的分析过程,使该文方法比现有方法更加简洁高效.扩展后的逻辑能够用于分析安全协议的猜测攻击,包括在线猜测攻击.

关 键 词:安全协议  猜测攻击  CKT5逻辑  模态逻辑  形式化分析  分析  安全协议  猜测攻击  模态  逻辑方法  Attacks  Guessing  Security  Protocol  Analyzing  Approach  Logic  过程  简化  引理  定理  相关  在线  验证  主体  规则
修稿时间:2005-01-272007-02-06

Modal Logic Approach for Analyzing Security Protocol Guessing Attacks
MAO Chen-Xiao,LUO Wen-Jian,WANG Xu-Fa.Modal Logic Approach for Analyzing Security Protocol Guessing Attacks[J].Chinese Journal of Computers,2007,30(6):924-933.
Authors:MAO Chen-Xiao  LUO Wen-Jian  WANG Xu-Fa
Affiliation:Department of Computer Science and Technology, University of Science and Technology of China , Hefei 230027
Abstract:In the field of security protocol formal verification, it is a new challenge to analyze security protocol guessing attacks. CKT5 logic, used as the base, is significantly extended in several aspects. Both public key cryptography and Vernam encryption are added to symmetric key cryptography of the original logic, which makes it more powerful in expressing security protocols. Perfect encryption hypothesis is not obeyed any more, and a series of definitions and rules are given to allow principals to guess and verify passwords. Theorems and lemmas given in this paper can describe features of on-line guessing attacks, and simplify the analysis procedure of guessing attacks. The extended logic can be used to analyze guessing attacks on security protocols including on-line guessing attacks.
Keywords:security protocol  guessing attacks  CKT5 logic  modal logic  formal analysis
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号