计算机科学 ›› 2015, Vol. 42 ›› Issue (1): 149-154.doi: 10.11896/j.issn.1002-137X.2015.01.035

• 信息安全 • 上一篇    下一篇

一种适用于嵌套加密协议分析的强认证测试方法

宋巍涛,胡斌   

  1. 信息工程大学 郑州450001,信息工程大学 郑州450001
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61272041,61202491,61272488)资助

One Strong Authentication Test Suitable for Analysis of Nested Encryption Protocols

SONG Wei-tao and HU Bin   

  • Online:2018-11-14 Published:2018-11-14

摘要: 认证测试是一种新型的在串空间模型基础上提出来的用于分析协议认证属性的形式化方法,该方法因简单实用而受到学者的广泛关注,但其不能分析协议中认证测试组件嵌套加密的情况,这极大地限制了它的应用范围。而现存的针对该局限性的改进方案,由于没有从本质上对串空间模型中关于消息项结构关系方面的语义进行完善,很难彻底突破认证测试的局限性。为此,通过在串空间模型中引入等价类、类组件、安全加密元及安全包裹元等概念,提高了串空间刻画消息项之间及内部结构关系的能力,并结合实例来阐明引入这些概念的必要性。在此基础上,提出一种可以分析测试组件嵌套加密的通用的认证测试方法,并从形式化证明与实例分析两方面验证了新测试方法的正确性与有效性。

关键词: 安全协议,形式化分析,串空间,认证测试

Abstract: Authentication test is a new type of analysis method of security protocols,which is proposed based on strand space model.It attracts a majority of scholars’ attention because of its simple and practical,but it doesn’t suitable for the analysis of nested encryption protocols.This greatly restricts the application of the method.Meanwhile,the existing improvement schemes are difficult to break through the limitation thoroughly on account of strand space’s poor ability of reflecting the internal relations of terms.By introducing the definitions of equivalence class,class elements,security encryption item,and security encryption package,etc.,this paper improved the strand space’s ability of depicting the internal relations of terms.Then it put forward a general authentication test scheme which can be applied to anylize the nested encryption scenarios of authentication test element in the protocols.Furthermore,we verified the correctness and effectiveness of the new method from two aspects:formal proof and instance analysis.

Key words: Security protocol,Formal analysis method,Strand space,Authentication test

[1] Fabrega F J T,Herzog J C,Guttman J D.Strand space:Why is a security protocol correct[C]∥IEEE Computer Society Press Proc.of the IEEE Symp.on Research in Security and Privacy.Oakland,1998:160-171
[2] Meadows C.Open issues in formal methods for cryptographic protocol analysis[C]∥Proceedings,IEEE DARPA Information Survivability Conference and Exposition.2000,1:237-250
[3] Guttman J D,Thayer F J.Authentication tests[C]∥Procee-dings,2000 IEEE Symposium on Security and Privacy.IEEE Computer Society Press,May 2000:96-109
[4] Guttman J D.Security protocol design via authentication tests[C]∥Proceedings Computer Security Foundations Workshop,2002.15th IEEE.IEEE,2002:92-103
[5] Wang Q,Zhi F H,Ao J H.Design and Security Analysis of Mobile Identity Authentication Protocol[J].Advanced Materials Research,2012,403:2645-2649
[6] Chen N,Jiang R.Security Analysis and Improvement of UserAuthentication Framework for Cloud Computing[J].Journal of Networks,2014,9(1):198-203
[7] Perrig A,Song D.Looking for diamonds in the desert-extending automatic protocol generation to three-party authentication and key agreement[C]∥Proc.of the 13th Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,2000:64-76
[8] Li Y J,Pang J.Generalized unsolicited tests for authenticationprotocol analysis[C]∥IEEE Computer Society Press Proc.of the 7th Int’l Conf.on Parallel and Distributed Computing,Applications and Technologies.2006:509-514
[9] Liu J F,Zhou M T.Research and improvement on authentication test’s limitation[J].High Technology Letters,2008,4(3):266-270
[10] 刘家芬,周明天.突破认证测试方法的局限性[J].软件学报,2009,0(10):2799-2809
[11] Zhang G,Rong M,Fang Y.One extension of authentication test based on strand space model[C]∥Proc.of the 5th International Conference on Wireless Communications,Networking and Mobile Computing.IEEE Press,2009:4506-4509
[12] Zhou Q,Wu X.Extensions to Authentication Test and Its Application[J].Journal of Zhengzhou University (Engineering Science),2010,3:014
[13] Wang Q,Zhi F H,Ao J H.Design and Security Analysis of Mobile Identity Authentication Protocol[J].Advanced Materials Research,2012,403:2645-2649
[14] Muhammad S.Applying authentication tests to discover Man-In-The-Middle attack in security protocols[C]∥Eighth International Conference on Digital Information Management (ICDIM),2013.IEEE,2013:35-40
[15] 余磊,魏仕民.协议主体密钥在测试组件构造上的性质分析[J].计算机工程与应用,2013,49(6):114-117
[16] Khot R A,Srinathan K, Kumaraguru P.A novel Jigsaw based authentication scheme using tagging[C]∥Proc.of the 2011 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.2011:2605-2614

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!