Analysis of security protocols based on challenge-response

来源 :Science in China(Series F:Information Sciences) | 被引量 : 0次 | 上传用户:mini8912
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods, which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authenti- cation goals and applies authentication logic as fundamental analysis techniques, in which secrecy analysis is split into two parts: Explicit-Information-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand parameters. This new method owns both the power of the Strand Space Model and concision of authentication logic. Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods, which either adopt theorem proving techniques such as state exploration or logic reasoning technique such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authenti cation goals and applies authentication logic as fundamental analysis techniques, in which secrecy analysis is split into two parts: Explicit-Information-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand parameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.
其他文献
有趣的科学实验让课堂教学更精彩,可一些老师和同学也为此而烦恼。对老师来说,同一位老师常常跨班级、跨年级授课,为了调换实验器材,老师常在课间奔波于实验室和教室之间,很
新课标指出:学生的学习活动应当是一个活泼的、生动的和富有个性的过程,自主探索与合作交流是学生学习的重要方式,小组合作学习成了新课程积极倡导的一种有效的学习方式。但
据瑞士《国际防卫评论》1980年8月报道,日本 Fujinon 公司研制成功一种称为“Stabi—scope”的陀螺稳象双目望远镜,据称这是一项技术突破。当使用倍率10×以上的高倍望远镜
第一、中国特色的市场经济是以“四个坚持”为前提的市场经济。这是最基本也是最重要的中国特色。“一个中心、两个基本点”的基本路线,是我国社会主义建设的总方向。作为我
今天,我们迎来了第七届穗港澳蓉青年技能竞赛这一竞技盛宴,有幸邀请到广州、香港、澳门的技能好手齐聚成都,两岸四地欢聚一堂,同场竞技,相互学习,增进友谊,我们倍感荣幸。在
教育工作者以正面的形象吸引和感染学生,要以身作则,要对学生倾注感情,与学生从内心情感上达到共鸣,为学生的发展建立一种完善的情感生活和一个健康的心理环境,用爱关注每一
本文系统地阐述了平面运动中作用在带有拖尾空泡的轴对称体上的流体动力和力矩的计算方法,计算中考虑了空泡表面的横向偏转。对不大的空泡偏转情况,所用的基本假设是,认为物
一提起乌鸦,许多人便会想到《伊索寓言》中“乌鸦喝水”的故事:乌鸦把石子扔到瓶子里,使瓶子里的水涨到了瓶颈,就能喝到水。乌鸦真有这么聪明吗?当然。科学家发现,乌鸦不仅能
多发性硬化(multiple sclerosis,MS)的诊断主要基于中枢神经系统病灶在时间上和空间上多发性的临床证据,且需除外可引起这些损害的其他疾病。目前被广泛应用的诊断标准有两种
被北约称之为“远距跟踪”的苏制防空雷达已被华约地面部队的防空团用作预警和目标搜索雷达。此外,这种雷达还可用来作为歼击机驾驶员的目标指示雷达。这种于1968年服役的雷