计算机科学 ›› 2010, Vol. 37 ›› Issue (1): 176-180.

• 软件工程与数据库技术 • 上一篇    下一篇

基于树语言逼近的安全协议形式化分析

刘楠,朱文也,祝跃飞,陈晨   

  1. (信息工程大学信息工程学院 郑州450002)
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家高技术研究发展计划(863) (2007AA012471)资助。

Formally Analyzing Security Protocol Using Approximation of Tree Language

LIU Nan,ZHU Wen-ye,ZHU Yue-fei,CHEN Chen   

  • Online:2018-12-01 Published:2018-12-01

摘要: 利用形式化方法或工具自动化分析实用安全协议十分必要,定理证明技术因其可解决无限状态系统的验证备受关注,但扩展其验证规模和自动化实现时仍然存在一些局限性。以定理证明和重写逼近理论为基础,以项重写形式化定义协议模型,以树自动机模拟协议攻击者知识集,给出攻击者知识集可达项逼近求解的算法,并根据上述模型讨论秘密性和认证性的验证方法,最后以Needham-Schroeder公钥认证协议为例验证模型的有效性,并指出下一步研究方向。

关键词: 安全协议,项重写,树自动机,树语言,逼近,秘密性,认证性

Abstract: Formal method and automated tools arc both necessary and efficient for analyzing practical security protocols. Theorem proving theory has been studied intensively because it can verify infinite-state system. But there are still limitations when verifying large scale system automatically. A formal model for security protocols was proposed based on theorem proving and rewriting approximation theory. It utilizes term rewriting system and tree automata to model protocol and the knowledge of intruder. An automatic generated approximation algorithm was designed to calculate the fix-point tree automata. In this model, secrecy and authentication were discussed. By a case of study, NSPK was analyzed effectively.

Key words: Security protocol, TRS, Tree automata, Tree language, Approximation, Secrecy, Authentication

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!