Cryptographic protocol security analysis based on bounded constructing algorithm

被引:0
|
作者
Xianxian Li
Jinpeng Huai
机构
[1] School of Computer,
[2] Beihang University,undefined
来源
Science in China Series F | 2006年 / 49卷
关键词
cryptographic protocol; formal analysis; security verification;
D O I
暂无
中图分类号
学科分类号
摘要
An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.
引用
收藏
页码:26 / 47
页数:21
相关论文
共 50 条
  • [31] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [32] On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function
    Chuah, Chai Wen
    Deris, Mustafa Mat
    Dawson, Edward
    INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 231 - 240
  • [33] UHF RFID Information Security Transmission Technology and Application Based on Domestic Cryptographic Algorithm
    Tian, Mengfan
    Qi, Junpeng
    Ma, Rui
    2019 6TH INTERNATIONAL CONFERENCE ON BEHAVIORAL, ECONOMIC AND SOCIO-CULTURAL COMPUTING (BESC 2019), 2019,
  • [34] Security evaluation of Midoril28 cryptographic algorithm under integral fault analysis
    Wei, Yuechuan
    He, Shuiyu
    Pan, Feng
    Wang, Xiangru
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2024, 46 (04): : 229 - 246
  • [35] What makes a cryptographic protocol secure? The evolution of requirements specification in formal cryptographic protocol analysis
    Meadows, C
    PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 10 - 21
  • [36] A Cryptographic Hardware Engineering Course based on FPGA and Security Analysis Equipment
    Lu, Zhaojun
    Chen, Qidong
    Xu, Peng
    Zhang, Jiliang
    Qu, Gang
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 706 - 711
  • [37] Security analysis of three cryptographic schemes from other cryptographic schemes
    Chow, SSM
    Cao, ZJ
    Liu, JK
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 290 - 301
  • [38] A Secure Multi-Party Strings Sorting Protocol Based on National Cryptographic Algorithm
    Zhou, Yousheng
    Ding, Shan
    Zuo, Xiangjian
    Liu, Yuanni
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (09): : 3763 - 3770
  • [39] Formal analysis of cryptographic protocol based on intruders algorithmic knowledge logic
    Xiao, MH
    Xue, JY
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 7, 2005, : 530 - 533