全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

New Security Protocol Verification Approach Based on Attack Sequence Solving
一种基于攻击序列求解的安全协议验证新算法

Keywords: Security protocol verification,Attack sequence solving,Automatic
安全协议验证
,攻击序列求解,自动化

Full-Text   Cite this paper   Add to My Lib

Abstract:

With the premises of the prefect encryption mechanism and the ICY attacker model, it concluded that the inject attack is the necessarily method for attackers to realize their aims. In this paper, the attributes of inject attack and attack sequences which come from inject attacks were analyzed. Based on those conclusions,it presented an algorithm to determine whether there is an attack sequence in a security protocol. And an new security protocol automatic verification approach was brought up based on this algorithm It was also proved that the algorithm can be terminated in the verificanon process for a regular security protocol. In the paper, the NSPK was verified by the algorithm The experimental results show that compared with other security protocol verification tools, as OFMC, the algorithm can not only realize security protocol automatic verification, but also more practicability for it can be terminated in regular protocol verification process.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133