全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Verification method of security protocols based on correlation rules
一种基于关联规则的安全协议验证方法

Keywords: security protocol,correlation rides,verification method
安全协议
,关联规则,验证方法,关联规则,安全协议,验证方法,rules,correlation,based,security,protocols,method,of,形式化分析方法,发现,统一,攻击路径,验证分析,认证协议,利用,关联特点,主体认证

Full-Text   Cite this paper   Add to My Lib

Abstract:

An approach for the formal analysis of security protocols based on the correlation rules was proposed. The character of correlation of protocols was pictured from three aspects: the correlation of authentication between principals, the correlation between messages and within the messages. The verification method was presented based on the above correlation property, which had been used to verify the Woo and Lam authentication Protocol in reverse analysis. Some known attack paths were derived successfully, and made these known attack paths can be derived from this method in unity, and also discovered an unknown attack path. The method provides a new perspective in the formal analysis of the protocols.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133