期刊文献+

基于Petri网的密码协议形式化建模 预览 被引量:1

Formal Modeling of Cryptographic Protocols Using Petri Nets
在线阅读 免费下载
收藏 分享 导出
摘要 密码协议是安全共享网络资源的机制和规范,是构建网络安全环境的基石,其安全性对整个网络环境的安全起着至关重要的作用。提出了采用Colored Petri Nets(CPN,着色Petri网)分析密码协议的新方法。采用新方法对TMN协议的多次并发会话通信进行形式化建模,模型依据会话配置和会话顺序进行功能单元划分,采用on-the-fly方法生成攻击路径。采用状态空间搜索技术,发现了该协议的多次并发会话不安全状态,并获得了新的攻击模式。 Cryptographic protocol is secure mechanism for sharing network resources,is the cornerstone to build securitynetwork environment.The security of the cryptographic protocol plays a vital role to entire network environment.A new colored Petri nets(CPN) methodology for security analysis of cryptographic protocol was proposed.We applied the new approach to model TMN protocol with multi concurrent session,and the model was categorized based on session configuration and session schedule.And the attack traces were obtained using on-the-fly method.Using the state space search method,several attack states of multi concurrent session were found,and a new attack pattern was obtained.
作者 白云莉 叶新铭 BAI Yun-li1,2 YE Xin-ming1(College of Computer Science,Inner Mongolia University,Hohhot 010021,China)1(College of Computer and Information Engineering,Inner Mongolia Agricultural University,Hohhot 010018,China)2
出处 《计算机科学》 CSCD 北大核心 2012年第8期70-74,共5页 Computer Science
基金 国家自然科学基金项目(61163011) 国家重点基础研究发展规划(973)项目(2007CB310702) 内蒙古自然科学基金重点项目(20080404ZD20)资助
关键词 密码协议 TMN CPN 多次并发会话 Cryptographic protocol TMN CPN Multi concurrent session
  • 相关文献

参考文献13

  • 1Jensen K, Kristensen L, Wells L. Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems[J]. In- ternational Journal on Software Tools for Technology Transfer (STTT), 2007,9 (3) : 213-254. 被引量:1
  • 2Dolev D,Yao A. On the security of public key protocols. Infor- mation Theory[J]. IEEE Transactions on Information Theory, 1983,29(2) :98-208. 被引量:1
  • 3Tatebayashi M, Matsuzaki N, Jr D B. Key distribution protocol for digital mobile communication systems[M]. Springer-Verlag, 1989,324-333. 被引量:1
  • 4Yu-Qing Z,Xiu-Ying L. An Approach to the Formal Analysis of TMN Protocol[M]. Progress on Cryptography, 2004:235-243. 被引量:1
  • 5Lowe G,Roscoe B. Using CSP to detect errors in the TMN pro- tocoI[J]. Software Engineering, IEEE Transactions on Software Engineering, 1997,23 (10) : 659-669. 被引量:1
  • 6薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:51
  • 7Permpoontanalarp Y. On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryp- tographic Protocols [M]. Formal Techniques for Distributed Systems, 2010 : 201-215. 被引量:1
  • 8A1-Azzoni I, Down D, Khedri R. Modeling and verification of cryptographic protocols using coloured petri nets and design/ CPN[J]. Nordic Journal of Computing, 2005,12 (3) : 201-228. 被引量:1
  • 9黎波涛,罗军舟.不可否认协议的Petri网建模与分析[J].计算机研究与发展,2005,42(9):1571-1577. 被引量:8
  • 10Tritilanunt S, Boyd C, Foo E. Using Coloured Petri Nets to Simu- late Dos-resistant Protocols [C]//Proceeding of 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools. 2006:261- 280. 被引量:1

二级参考文献90

  • 1Kemmerer R. A.. Analyzing encryption protocols using formal verification techniques. IEEE Journal of Selected Areas in Communications, 1989, 7(4):448-457. 被引量:1
  • 2Kemmerer R. A.. Analyzing encryption protocols using formal verification techniques. In: Carl Pomerance ed.. Advances in Cryptology-CRYPTO'87. Lecture Notes in Computer Science 293. Springer-Verlag,1988,289-305. 被引量:1
  • 3Burrows M.. Abadi M. , Needham R.. A logic of authentication. ACM Transactions in Computer Systems,1990, 8 (1):18-36. 被引量:1
  • 4Vardi M. Y.. Why is modal logic so robustly decidable? In:Immerman N. , Kolaitis Ph. G. eds.. Descriptive Complexity and Finite Models, DIMACS Series in Discrete Mathematics and Theoretical Computer Science. New York:AMS, 1997,149-184. 被引量:1
  • 5Lowe G,, Breaking and fixing the Needham Schroeder public key protocol using FDR. In: Proceedings of TACAS. Lecture Notes in Computer Science 1055. Passau, Germany: Springer-Verlag, 1996, 147-166. 被引量:1
  • 6Abadi M,, Secrecy by typing in security protocols, Journal of the ACM, 1999, 46(5): 749-786. 被引量:1
  • 7Gordon A. , Jeffrey A.. Authenticity by typing in security protocols. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, 2001, 145-159. 被引量:1
  • 8Abadi M. , Gordon A. D,. A calculus for cryptographic protocols: The Spi calculus, Information and Computation, 1999,148(1):1-70. 被引量:1
  • 9Canetti R.. Universally composable seeurity: A new paradigm for cryptographic protocols. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS),2001, 136-145. 被引量:1
  • 10Milner R.. A calculus of communication systems. Lecture Notes in Computer Science 92. New York: Springer Verlag,1980. 被引量:1

共引文献57

同被引文献9

  • 1StylianosBasagiannis,PanagiotisKatsaros,AndrewPombortsis.Synthesis of attack actions using model checking for the verification of security protocols[J]. Security Comm. Networks . 2011 (2) 被引量:1
  • 2Catherine Meadows.The NRL Protocol Analyzer: An Overview[J]. The Journal of Logic Programming . 1996 (2) 被引量:1
  • 3Dolev D,Yao A C.On the security of public key protocols. Proceedings of IEEE 22nd Annual Symposium on Foundations of Computer Science . 1981 被引量:1
  • 4Millen, J.K.,Clark, S.C.,Freedman, S.B.The Interrogator: Protocol Secuity Analysis. Software Engineering, IEEE Transactions on . 1987 被引量:1
  • 5Jensen K,Kristensen L.Coloured Petri Nets:Modeling and Validation of Concurrent Systems. . 2009 被引量:1
  • 6CPN-Tools:. http://cpntools.org/ . 被引量:1
  • 7Basagiannis S,Katsaros P,Pombortsis A.Intrusion Attack Tactics for the model checking of e-commerce security guarantees. Computer Safety, Reliability, and Security . 2007 被引量:1
  • 8Bai Yunli,Ye Xinming.Attack trace generation of cryptographic protocols based on coloured Petri nets model. International Journal of Wireless and Mobile Computing . 2013 被引量:1
  • 9Tatebayashi M,Matsuzaki N,Newman Jr D B.Key distribution protocol for digital mobile communication systems. . 1989 被引量:1

引证文献1

投稿分析
职称考试

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部 意见反馈