Security protocols' analytic approach of reconciling two views

被引:1
|
作者
Institute of Network Information and Security, Shandong University, Jinan 250100, China [1 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2006年 / 7卷 / 1260-1266期
关键词
Formal logic - Network protocols;
D O I
10.1360/crad20060719
中图分类号
学科分类号
摘要
The symbol approach and the computational approach are two different approaches in security protocols' formal analysis, but the former is quite alien to the latter. The former regards protocols as a set of symbols and believes that cryptography has a secure property of 'all-or-nothing'; the latter regards protocols as a set of strings, and considers that cryptography is not strong enough to resist adversary's attack. Because each approach has flaws and virtues, an idea is brought forward that is engaged in drawing virtues from both approaches and discarding their flaws to build a mature approach to analyze security protocols. A new analytic approach reconciling the two approaches is constructed following this idea. The new approach defines the security as the completeness and the correctness, through analyzing them. It not only can examine whether protocols could reach the expectant goals, but also can compute adversary's aggressive ability to protocols. The approach is the first one which puts forward the idea that analyzes security protocols from logistic reliability and cryptographic reliability.
引用
收藏
相关论文
共 50 条
  • [11] On the Security of Two Ownership Transfer Protocols and Their Improvements
    Bagheri, Nasour
    Aghili, Farhad
    Safkhani, Masoumeh
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (01) : 87 - 93
  • [12] A Note on the Security of Two Improved RFID Protocols
    Safkhani, Masoumeh
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (02): : 155 - 160
  • [13] A Z based approach to verifying security protocols
    Long, BW
    Fidge, CJ
    Cerone, A
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
  • [14] The Simplified Inductive Approach to Verifying Security Protocols
    Wang Juan
    Zhou Yajie
    Mang Huanguo
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526
  • [15] Reconciling privacy and security
    van Lieshout, Marc
    Friedewald, Michael
    Wright, David
    Gutwirth, Serge
    INNOVATION-THE EUROPEAN JOURNAL OF SOCIAL SCIENCE RESEARCH, 2013, 26 (1-2) : 119 - 132
  • [16] Cryptoanalysis on the Forward Security of Two Authenticated Key Protocols
    Cheng Qingfeng
    Ma Yuqian
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (12) : 4294 - 4303
  • [17] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [18] On the (in)security of two buyer-seller watermarking protocols
    Sen Poh, Geong
    Martin, Keith M.
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
  • [19] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
  • [20] Security Analysis and Improvement on Two RFID Authentication Protocols
    Shaohui Wang
    Sujuan Liu
    Danwei Chen
    Wireless Personal Communications, 2015, 82 : 21 - 33