|
计算机应用研究 2008
Research on how to reconcile two views of security protocols''''analysis
|
Abstract:
The formal methods of security protocol was categorized as two classes: the symbol approach, and the computational approach. The first relies on a simple but effective formal approach; the latter, on a detailed computational model that considers issues of complexity and probability. Each approach had flaws and virtues. There was an uncomfortable and interesting gap between these two approaches to cryptography. How to bridge the gap by drawing virtues from both approach and discarding their flaw was the new challenge. This paper described the most popular methods, analyzed the current status, as well as pointed out the tendency of them.