期刊文献+

基于SPIN的Andrew Secure RPC协议并行攻击模型检测 被引量:2

Model Checking of Parallel Attack in Andrew Secure RPC Protocol Based on SPIN
在线阅读 下载PDF
导出
摘要 Andrew Secure RPC协议具有身份认证和秘钥交换功能,其因简洁明了而被广泛应用于对称密钥加密体系中。模型检测技术具有高度自动化的优点,在协议安全性验证领域得到广泛应用,但模型检测方法只能检测到一轮协议会话中存在的攻击,难以检测到多轮并行会话中存在的并行攻击。针对Andrew Secure RPC协议运行环境中存在的并行性与可能出现的安全隐患,提出了组合身份建模方法。该方法运用著名的SPIN模型检测工具,对Andrew Secure RPC协议进行模型检测,从而得到攻击序列图,成功发现并行反射攻击和类缺陷攻击。上述组合身份建模方法为复杂环境下协议的模型检测提供了新的方向。 Andrew Secure RPC protocol is a kind of protocol with functions of identity authentication and key exchange,which is widely used in symmetric cryptography because of its conciseness.Model checking technology is widely used in verification of protocols due to its high automation,however,there is also a disadvantage in model checking technology that it can only find out attacks in single round of protocol session,which is hard used in multi rounds of protocol session.We proposed a modeling method,called combinatorial identity modeling method,which uses SPIN to verify Andrew Secure RPC protocol in consideration of the parallel environment and potential danger in Andrew Secure RPC protocol.According to the research conclusion,we found out two kinds of attacks which are reflection attack and type flaw attack in Andrew Secure RPC protocol.With this conclusion,we offered a new direction in model checking research in verifying protocol under complicated environment.
出处 《计算机科学》 CSCD 北大核心 2015年第7期103-107,共5页 Computer Science
基金 国家自然科学基金(61163005) 计算机软件新技术国家重点实验室开放课题(KFKT2012B18) 江西省高校科技落地计划项目(KJLD13038) 江西省自然科学基金(2010GZS0150 20132BAB201033)资助
关键词 ANDREW SECURE RPC协议 模型检测 SPIN 组合身份建模 并行攻击 Andrew Secure RPC protocol Model checking SPIN Combinatorial identity modeling method Parallel attacks
  • 相关文献

参考文献12

  • 1Burrows M, Abadi M, Needham R M. A logic of authentication [J]. Series A, Mathematical and Physical Sciences, 1989, 426 (1871) :233-271.
  • 2Lowe G. Some new attacks upon security protocols[C]//CS- FW, 1996. 1996 : 162-169.
  • 3周清雷,赵琳,赵东明.基于串空间模型的Andrew RPC协议的分析与验证[J].计算机工程与应用,2007,43(13):153-155. 被引量:2
  • 4Holzmann G J. The model checker SPIN[J]. IEEE Transactions on software engineering, 1997,23 (5) : 279-295.
  • 5吴昌,肖美华,罗敏,刘俏威,熊昊.安全协议验证模型的高效自动生成[J].计算机工程与应用,2010,46(2):79-82. 被引量:4
  • 6Maggi P, Sisto R. Using SPIN to verify security properties of eryptographic protocols [ M ] // Model Checking Software. Springer Berlin Heidelberg, 2002 : 187-204.
  • 7Krawczyk U, Sapiecha P. Effective reduction of cryptographic protocols specification for model-checking with Spin[J]. Annales UMCS, Inforrnatica, 2011,11 ( 3 ) : 27-40.
  • 8Ruys T C, Holzmann G J. Advanced spin tutorial[M]//Model Checking Software. Springer Berlin Heidelberg, 2004:304-305.
  • 9Dolev D,Yao A C. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29 (2) : 198- 208.
  • 10侯刚,周宽久,勇嘉伟,任龙涛,王小龙.模型检测中状态爆炸问题研究综述[J].计算机科学,2013,40(06A):77-86. 被引量:25

二级参考文献172

共引文献33

同被引文献13

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部