Computer Science ›› 2010, Vol. 37 ›› Issue (1): 176-180.
Previous Articles Next Articles
LIU Nan,ZHU Wen-ye,ZHU Yue-fei,CHEN Chen
Online:
Published:
Abstract: Formal method and automated tools arc both necessary and efficient for analyzing practical security protocols. Theorem proving theory has been studied intensively because it can verify infinite-state system. But there are still limitations when verifying large scale system automatically. A formal model for security protocols was proposed based on theorem proving and rewriting approximation theory. It utilizes term rewriting system and tree automata to model protocol and the knowledge of intruder. An automatic generated approximation algorithm was designed to calculate the fix-point tree automata. In this model, secrecy and authentication were discussed. By a case of study, NSPK was analyzed effectively.
Key words: Security protocol, TRS, Tree automata, Tree language, Approximation, Secrecy, Authentication
LIU Nan,ZHU Wen-ye,ZHU Yue-fei,CHEN Chen. Formally Analyzing Security Protocol Using Approximation of Tree Language[J].Computer Science, 2010, 37(1): 176-180.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2010/V37/I1/176
Cited