全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

模型检测中可变攻击者模型的构造

DOI: 10.13190/jbupt.201102.54.yangyy, PP. 54-57

Keywords: 安全协议,攻击者模型,代数运算,重写规则

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出了一个可变攻击者模型构造方案.该方案通过定义抽象项的概念及其运算规则,大大降低了攻击者进行代数运算的复杂度.定义了攻击者行为库和攻击规则选择算法,使检测者能根据不同的协议构造不同的攻击者模型.由于攻击者行为可任意组合,故实现了攻击者模型的可变性.可变攻击者模型保证了模型检测工具对协议分析的效率和准确性.

References

[1]  Dolev D, Yao A. On the security of public-key protocols[J]. IEEE Trans on Information Theory, 1983, 29(2): 198-208.
[2]  Yohan B, Pierre-Cyrille H, Olga K. Tree automata for detecting attacks on protocols with algebraic cryptographic primitives[J]. Electronic Notes in Theoretical Computer Science, 2009, 239(1): 57-72.
[3]  Bruno B, Martín A, Cédric F. Automated verification of selected equivalences for security protocols[J]. Journal of Logic and Algebraic Programming, 2008, 75(1): 3-51.
[4]  Veronique C, Stephanie D, Pascal L. A survey of algebraic properties used in cryptographic protocols[J]. Journal of Computer Security, 2006, 14(1): 1-43.
[5]  David B, Sebastian M, Luca V. Algebraic intruder deductions//LPAR 2005. Montego Bay: Springer, 2005: 549-564.
[6]  邱慧敏, 杨义先, 钮心忻. 无线传感器网络中广播通信的安全协议设计[J]. 北京邮电大学学报, 2006, 29(5): 103-106. Qiu Huimin, Yang Yixian, Niu Xinxin. Security protocol design about broadcast in wireless sensor network[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(5): 103-106.
[7]  邓淼磊, 马建峰, 周利华. RFID匿名认证协议的设计[J]. 通信学报, 2009, 30(7): 20-26. Deng Miaolei, Ma Jianfeng, Zhou Lihua. Design of anonymous authentication protocol for RFID[J]. Journal on Communications, 2009, 30(7): 20-26.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133