|
计算机应用研究 2005
Using Running Model for TW Cryptographic Protocol Analysis
|
Abstract:
A methodology is presented for using running model methods to analyze the two-party cryptographic protocols. We illustrate the feasibility of the approach by analyzing TW cryptographic protocol and discover attacks upon the protocol. Thus, the method using running modes has proved to be an effective approach to analyze two-party cryptographic protocols.