Security protocols' analytic approach of reconciling two views

被引:1
|
作者
Institute of Network Information and Security, Shandong University, Jinan 250100, China [1 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2006年 / 7卷 / 1260-1266期
关键词
Formal logic - Network protocols;
D O I
10.1360/crad20060719
中图分类号
学科分类号
摘要
The symbol approach and the computational approach are two different approaches in security protocols' formal analysis, but the former is quite alien to the latter. The former regards protocols as a set of symbols and believes that cryptography has a secure property of 'all-or-nothing'; the latter regards protocols as a set of strings, and considers that cryptography is not strong enough to resist adversary's attack. Because each approach has flaws and virtues, an idea is brought forward that is engaged in drawing virtues from both approaches and discarding their flaws to build a mature approach to analyze security protocols. A new analytic approach reconciling the two approaches is constructed following this idea. The new approach defines the security as the completeness and the correctness, through analyzing them. It not only can examine whether protocols could reach the expectant goals, but also can compute adversary's aggressive ability to protocols. The approach is the first one which puts forward the idea that analyzes security protocols from logistic reliability and cryptographic reliability.
引用
收藏
相关论文
共 50 条
  • [21] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
  • [22] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
  • [23] Security Analysis and Improvement on Two RFID Authentication Protocols
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (01) : 21 - 33
  • [24] Analysis on Security Proof of Two Key Agreement Protocols
    Zhou, Huihua
    Zheng, Minghui
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +
  • [25] Knowledge Based Approach for Mechanically Verifying Security Protocols
    Ma, Xiaoqi
    Cheng, Xiaochun
    McCrindle, Rachel
    19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), 2005, : 1572 - 1573
  • [26] Security protocols analysis: A SDL-based approach
    Lopez, J
    Ortega, JJ
    Troya, JM
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (05) : 489 - 499
  • [27] SPFPA: A format parsing approach for unknown security protocols
    Zhu, Yuna
    Han, Jihong
    Yuan, Lin
    Chen, Hantuo
    Fan, Yudan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2200 - 2211
  • [28] Toward Reasoning about Security Protocols: A Semantic Approach
    Hommersom, Arjen
    Meyer, John-Jules
    de Vink, Erik
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 126 : 53 - 75
  • [29] Reconciling contrasting views on economic complexity
    Carla Sciarra
    Guido Chiarotti
    Luca Ridolfi
    Francesco Laio
    Nature Communications, 11
  • [30] Migration and development: reconciling opposite views
    Portes, Alejandro
    ETHNIC AND RACIAL STUDIES, 2009, 32 (01) : 5 - 22