Cryptographic protocol security analysis based on bounded constructing algorithm

被引:0
|
作者
Xianxian Li
Jinpeng Huai
机构
[1] School of Computer,
[2] Beihang University,undefined
来源
Science in China Series F | 2006年 / 49卷
关键词
cryptographic protocol; formal analysis; security verification;
D O I
暂无
中图分类号
学科分类号
摘要
An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.
引用
收藏
页码:26 / 47
页数:21
相关论文
共 50 条
  • [1] Cryptographic protocol security analysis based on bounded constructing algorithm
    LI Xianxian & HUAI Jinpeng School of Computer
    Science in China(Series F:Information Sciences), 2006, (01) : 26 - 47
  • [2] Cryptographic protocol security analysis based on bounded constructing algorithm
    Li, XX
    Huai, JP
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01): : 26 - 47
  • [3] A security-enhanced scheme for MQTT protocol based on domestic cryptographic algorithm
    Liu, Zechao
    Liang, Tao
    Lyu, Jiazhuo
    Lang, Dapeng
    Computer Communications, 2024, 221 : 1 - 9
  • [4] A security-enhanced scheme for MQTT protocol based on domestic cryptographic algorithm
    Liu, Zechao
    Liang, Tao
    Lyu, Jiazhuo
    Lang, Dapeng
    COMPUTER COMMUNICATIONS, 2024, 221 : 1 - 9
  • [5] Security of internet of things based on cryptographic algorithm
    Mittal, Sonam
    Singh, Soni
    Balakumaran, D.
    Hemalatha, K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 28 - 39
  • [6] A security-based asymmetric cryptographic algorithm to improve IEEE802.11i protocol
    Shafiabadi M.H.
    Souri A.
    Ghasempour A.
    Asgari F.
    International Journal of Information Technology, 2019, 11 (4) : 821 - 827
  • [7] SECURITY ANALYSIS FOR A LIGHTWEIGHT MODIFIED CRYPTOGRAPHIC TEA ALGORITHM
    Elmahallawy, Mohamed
    Aldelhalim, M. B.
    Abdallah, Mohamed
    Elhennawy, Adel
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 75 - 81
  • [8] Improving the Security of Cryptographic Protocol Standards
    Basin, David
    Cremers, Cas
    Miyazaki, Kunihiko
    Radomirovic, Sasa
    Watanabe, Dai
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 24 - 31
  • [9] Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models
    Kaneko, Satoshi
    Echizen, Isao
    Yoshiura, Hiroshi
    DIGITAL WATERMARKING, 2009, 5450 : 401 - +
  • [10] Cryptographic Protocol Security Verification of the Electronic Voting System Based on Blinded Intermediaries
    Babenko, Liudmila
    Pisarev, Ilya
    PROCEEDINGS OF THE THIRD INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'18), VOL 2, 2019, 875 : 49 - 57