期刊文献+

一种密码测评工具自动化调度方法及实现

An automatic scheduling method and implementation of cryptographic evaluation tools
在线阅读 下载PDF
导出
摘要 提出一种密码测评工具自动化调度平台方案,该方案能够依据测评工具之间的依赖关系进行自动化装配,调度测评任务有序开展,归集测评中间数据并调度实时数据流转,根据模板输出报告,并支持产品接入、新建系统、系统运行3种测评场景。测评人员只需上传测评对象的应用场景拓扑图,在图中标识检查点选择所要使用的测评工具,然后通过调度平台向测评工具发送调度指令即可完成测评任务。调度平台采用网络接口调度测评工具,具有可扩展性,现有的测评工具只需依据本文提出的测评工具统一接口模型进行适配调整即可集成到调度平台中接受调度。 In the process of cryptographic application evaluation,the evaluators complete the onsite evaluation and result analysis with the help of cryptographic evaluation tools.In practical application,the evaluators often need to use multiple evaluation tools in series.The output of one cryptographic evaluation tool needs to be used as the input of another tool to obtain further detection results.For example,when analyzing the SSL protocol,the digital certificate used for authentication should be extracted to complete the certificate format compliance verification.However,the existing evaluation tools are usually designed and developed independently for specific evaluation purposes,and they do not have the ability to work together with each other.The input and output data required by each tool still need evaluators to carry out manual collection,data conversion,import and export,which is time-consuming and labor-consuming,and it is easy to introduce manual errors in the process of processing data.This paper proposes a scheme of automatic scheduling platform for cryptographic evaluation tools.The scheme can automatically assemble according to the dependency between evaluation tools,schedule evaluation tasks in an orderly manner,collect evaluation intermediate data and schedule real-time data flow,output reports according to templates,and support three evaluation scenarios:product access,new system and system operation.Evaluators only need to upload the application scenario topology map of the evaluation object,identify checkpoints in the map,select the evaluation tool to be used,and then send scheduling instructions to the evaluation tool through the scheduling platform to complete the evaluation task.The scheduling platform adopts the network interface scheduling evaluation tool,which has scalability.The existing evaluation tools only need to be adapted and adjusted according to the unified interface model of evaluation tools proposed in this paper,and can be integrated into the scheduling platform to accept scheduling.
作者 张萌 王平建 陈天宇 ZHANG Meng;WANG Pingjian;CHEN Tianyu(CAS Data Assurance&Communications Security Center,Beijing 100093,China;School of Cyberspace Security,University of Chinese Academy of Sciences,Beijing 100049,China;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China)
出处 《中国科学院大学学报(中英文)》 CAS CSCD 北大核心 2023年第6期843-852,共10页 Journal of University of Chinese Academy of Sciences
基金 国家重点研发计划(2018YFB0804303)资助。
关键词 密码测评工具 自动调度 测评工具模型 调度平台 cypher evaluation tool automatic scheduling evaluation tool model dispatching platform
  • 相关文献

参考文献6

二级参考文献36

  • 1罗鹏 祝跃飞.Windows下RDP协议的安全性.计算机工程,2007,(20):145-147.
  • 2李凤华,苏昊欣,谢绒娜等.密码算法随机性测评系统的研究[C]..第十九届全国信息保密学术会议.敦煌中国,2009.112-119.
  • 3Li Fenghua,Su Haoxin,Shi Guozhen,et al.Research on the Framework Integrated by Scalable Components[C] //Proc.of the World Congress on Software Engineering.[S.l.] :IEEE Computer Society,2009:442-446.
  • 4Wang X,Yu H.How to break MD5 and other hash functions[C]//Advances in Cryptology-EUROCRYPT 2005.Springer Berlin Heidelberg,2005:19-35.
  • 5Wang X,Yin Y L,Yu H.Finding collisions in the full SHA-1[C]//Advances in Cryptology-CRYPTO 2005.Springer Berlin Heidelberg,2005:17-36.
  • 6Schlosser D,Binzenhofer A,Staehle B.Performance comparison of windows-based thin-client architectures[C]//Telecommunication Networks and Applications Conference,2007,ATNAC 2007.Australasian,IEEE,2007:197-202.
  • 7Wang J,Liang L.Survey of virtual desktop infrastructure system[EB/OL].(2011-05-13)[2014-08-15].https://tools.ietf.org/html/draft-ma-appsawg-vdi-survey-00#page-30.
  • 8Boca I.Citrix ICA Technology Brief[R].Technical White Paper,1999.
  • 9Pfleeger S L.Taking action to build trust in security[J].Security & Privacy,2014,12(2):3-4.
  • 10SPICE.SPICE sources and documentations[CP/OL].[2014-08-15].http ://www. spice-space, org/.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部