首页 | 本学科首页   官方微博 | 高级检索  
     

基于串空间理论的Kerberos协议分析
引用本文:魏浩,解争龙,弋改珍. 基于串空间理论的Kerberos协议分析[J]. 微机发展, 2013, 0(12): 109-112
作者姓名:魏浩  解争龙  弋改珍
作者单位:咸阳师范学院信息工程学院,陕西咸阳712000
基金项目:陕西省科技计划项目(SJ08ZT14-8);陕西省教育自然科学基金项目(08JK481);咸阳师范学院基金项目(06XSYK277)
摘    要:在介绍串空间理论基本概念、攻击者模型以及Kerberos协议的基础上,利用串空间理论得出Kerberos各协议参与主体和攻击者的迹,构造了协议的串空间,给出了Kerberos协议的丛图。在证明一个定理的基础上,使用启发式和反证法的思路,证明了认证服务器分配给客户端和应用服务器会话密钥的保密性,即攻击者从现有知识和构造能力无法推导出服务器分配给客户端和应用服务器的会话密钥;证明了客户端和认证服务器以及客户端和应用服务器能够相互认证,得出了Kerberos协议正确性的结论。

关 键 词:串空间  Kerberos协议  保密性  认证性

Analysis of Kerberos Protocol Based on Strand Space Theory
WEI Hao,XIE Zheng-long,YI Gai-zhen. Analysis of Kerberos Protocol Based on Strand Space Theory[J]. Microcomputer Development, 2013, 0(12): 109-112
Authors:WEI Hao  XIE Zheng-long  YI Gai-zhen
Affiliation:( College of Information Engineering, Xiangyang Normal University, Xianyang 712000, China)
Abstract:Based on the theory of the string space, the model of the attacker and the Kerbems protocol, obtain traces of the subject in- volved in Kerberos protocol and the attacker with string space theory ,and establish string.space and bundles of the Kerbcms protocol. It is proved that the session key of the client and application server assigned by authentication server is confidential by heuristic and reduction to absurdity. The attacker can not obtain the session key from existing knowledge and building capacity. The client and the authentication server and client and application server can be authenticated each other. It is concluded that the Kerberos protocol is correct.
Keywords:swing space  Kerberos protocol  confidentiality  authenticity
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号