|
计算机应用研究 2005
Layer-based Model for Security Protocol Authentication
|
Abstract:
This paper presents a new layer-based method for the verification of security protocols. Firstly, it shows how to divide a security property which a protocol should respect into several sub-properties. Then, without changing its security prope rty, transform the protocol we want to prove safe and divide it into a multi-layer protocol in a way there are as many sub-layers as sub-properties. If ever y sub-layer can be proved to respect the property of a sub-destination, it can d raw the conclusion that the whole protocol also respects the initial property, in other words, the protocol is guaranteed to be secure. Compared with traditional verification method, this method is not only more efficient but also more complete.