Computer Science ›› 2010, Vol. 37 ›› Issue (9): 32-35.
Previous Articles Next Articles
HAN Jin,XIE Jun-yuan
Online:
Published:
Abstract: With the premises of the prefect encryption mechanism and the ICY attacker model, it concluded that the inject attack is the necessarily method for attackers to realize their aims. In this paper, the attributes of inject attack and attack sequences which come from inject attacks were analyzed. Based on those conclusions,it presented an algorithm to determine whether there is an attack sequence in a security protocol. And an new security protocol automatic verification approach was brought up based on this algorithm It was also proved that the algorithm can be terminated in the verificanon process for a regular security protocol. In the paper, the NSPK was verified by the algorithm The experimental results show that compared with other security protocol verification tools, as OFMC, the algorithm can not only realize security protocol automatic verification, but also more practicability for it can be terminated in regular protocol verification process.
Key words: Security protocol verification, Attack sequence solving, Automatic
HAN Jin,XIE Jun-yuan. New Security Protocol Verification Approach Based on Attack Sequence Solving[J].Computer Science, 2010, 37(9): 32-35.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2010/V37/I9/32
Cited