%0 Journal Article %T Verification method of security protocols based on correlation rules
一种基于关联规则的安全协议验证方法 %A HU Sheng-zhou %A YU Min %A ZHANG Zhi-ming %A
胡声洲 %A 余敏 %A 章志明 %J 计算机应用 %D 2007 %I %X An approach for the formal analysis of security protocols based on the correlation rules was proposed. The character of correlation of protocols was pictured from three aspects: the correlation of authentication between principals, the correlation between messages and within the messages. The verification method was presented based on the above correlation property, which had been used to verify the Woo and Lam authentication Protocol in reverse analysis. Some known attack paths were derived successfully, and made these known attack paths can be derived from this method in unity, and also discovered an unknown attack path. The method provides a new perspective in the formal analysis of the protocols. %K security protocol %K correlation rides %K verification method
安全协议 %K 关联规则 %K 验证方法 %K 关联规则 %K 安全协议 %K 验证方法 %K rules %K correlation %K based %K security %K protocols %K method %K of %K 形式化分析方法 %K 发现 %K 统一 %K 攻击路径 %K 验证分析 %K 认证协议 %K 利用 %K 关联特点 %K 主体认证 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=831E194C147C78FAAFCC50BC7ADD1732&aid=14E16CBD27430512A3840ED751D071EF&yid=A732AF04DDA03BB3&vid=DB817633AA4F79B9&iid=5D311CA918CA9A03&sid=E1BA6CA93A8F9A6A&eid=7F4621C62254E923&journal_id=1001-9081&journal_name=计算机应用&referenced_num=0&reference_num=6