期刊文献+

SPI演算规范的建模、实现验证研究 被引量:1

Research on Model and Implementation Authentication of SPI Calculus Specifications
在线阅读 下载PDF
导出
摘要 针对安全协议安全属性是否满足,缺乏有效性能评价方法的现状,大都使用SPI演算或相近的进程代数方法进行建模。利用这种方法不仅能够有效地形式化描述安全协议,并且能够对安全协议进行多方面的系统评价,但基本上没有说明怎么样寻找设计合适的验证工具,验证其安全属性实现的正确性。本文引入基于SPI演算的验证工具SPRITE来保证建模过程正确性,并设计给出实现映射的具体方法。本方法通过对典型的WOO-LAM单向认证协议予以说明,最后SPRITE产生的具体JAVA代码,给出了安全协议的安全属性,使形式化描述的协议的安全属性是否满足更接近于人的理解而不仅只是机器的解释。 Under the situations of effective approach being lack to evaluate the security properties of security protocols, an approach is proposed to construct the security protocol based on SPI calculus or similar process algebra in this paper. Applying this approach, the formal description of security protocol can be described effectively, furthermore, the SPI calculus can be implemented. However, there is no any traces to illustrate how to find or design an adapted tool to authenticate the correction of the security properties of the security protocol. In this paper we introduce SPRITE, SPRITE is a tool based on SPI calculus that can guarantee whether is the model and process describing right or not, and design the concrete ways to implement the reflection from abstract SPI calculus to concrete Java code. The approach is illustrated by a typed one way authentication protocol WOO-LAM security protocol. The authentication tool SPRITE generate concrete Java code that can be simple and concrete to describe the security property. It is more adapt to mankind's understand not just to adapt computer interpretation.
出处 《计算机科学》 CSCD 北大核心 2007年第10期80-83,共4页 Computer Science
基金 国家自然科学基金(No.60473098) 国家高技术研究发展计划(863)(No.2004AAll2040)资助
关键词 形式化方法 进程代数 安全协议 SPI演算 应用程序接口(API) Formal method, Process algebra, Security protocol, SPI calculus , API
  • 相关文献

参考文献16

  • 1Gu Yonggen, Fu Yuxi. A Simple Process Calculus for the analysis of Security Protocals. In: Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference,Dec. 2005. 110-114
  • 2李国强,顾永跟,傅育熙.基于Spi演算的Kerberos认证协议形式化研究[J].计算机科学,2004,31(11):7-10. 被引量:2
  • 3赵宇,王亚弟,韩继红.基于Spi演算的SSL3.0协议安全性分析[J].计算机应用,2005,25(11):2515-2520. 被引量:7
  • 4顾永跟,李国强,王国钧.基于类pi演算的电子支付协议安全性形式化研究[J].计算机应用研究,2006,23(3):22-24. 被引量:2
  • 5Sumii E, Pierce B C. A bisimulation for type abstraction and recursion. ACM SIGPLAN Notices, 2005,40(1)
  • 6Haack C, Jeffrey A. Timed SPI-calculus with types for secrecy and authenticity. Lecture Notes in Computer Science, 2005
  • 7Stark I. A fulIy abstract domain model for the π-calculus[J]. In: Proceedings of the 11^th Annual IEEE Symposium on Logic in Computer Science, New Brunswick, New Jersey, USA, July 1996. 36-42
  • 8卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:118
  • 9Abadi M, Gordon A D. A calculus for cryptographic protocols: The SPI calculus[R].: [Technical Report]. Digital Systems Research Centre, 1998
  • 10Woo T Y C, Lam S S. Authentication for distributed systems [J]. Computer,1992, 25(1):39-52

二级参考文献38

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2R Milner,J Parrow,et al.A Calculus of Mobile Processes,Parts I and II[J].Information and Computation,1992,1-40,41-77.
  • 3M Abadi,C Fournet.Mobile Values,New Names and Secure Communication[C].The 28th ACM Symposium on Principles of Programming Languages(POPL'01),2001.104-115.
  • 4M Abadi,B Blanchet.Computer-assisted Verification of a Protocol for Certified Email[C].Static Anlaysis,the 10th International Symposium(SAS'03),LNCS 2694,Springer-Verlag,2003.316-335.
  • 5M Abadi,B Blanchet,C Fournet.Just Fast Keying in the pi Calculus[C].The 13th European Symposium on Programming,LNCS 2986,Springer-Verlag,2004.340-354.
  • 6M Abadi,C Fournet.Hiding Names:Private Authentication in the Applied pi Calculus[C].The Proceedings of the International Symposium on Software Security (ISSS'02),LNCS 2609,Springer-Verlag,2003.317-338.
  • 7M Bellare,et al.iKP:A Family of Secure Electronic Payment Protocols[C].USENIX,1995.
  • 8M Bellare,J Garay,R Hauser,et al.Design,Implementation,and Deployment of the iKP Secure Electronic Payment System[J].IEEE Journal of Selected Areas in Communications,2000,18:611-627.
  • 9T Y C Woo,S S Lam.A Semantic Model for Authentication Protocols[C].The 14th IEEE Symposium on Research in Security and Privacy,IEEE Computer Society Press,1993.178-194.
  • 10Abadi M,Gordon A D. A calculus for cryptographic protocols:The spi calculus. In:the Proc. of the Fourth ACM Conf. on Computer and Communications Security, 1997

共引文献125

同被引文献10

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部