Cryptographic protocol security analysis based on bounded constructing algorithm

被引:0
|
作者
Xianxian Li
Jinpeng Huai
机构
[1] School of Computer,
[2] Beihang University,undefined
来源
Science in China Series F | 2006年 / 49卷
关键词
cryptographic protocol; formal analysis; security verification;
D O I
暂无
中图分类号
学科分类号
摘要
An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.
引用
收藏
页码:26 / 47
页数:21
相关论文
共 50 条
  • [41] Loose Security Protocol Algorithm Design and Performance Analysis Method
    Liu, Kaifen
    bin Shamsudin, Muhd Amirul Najhan
    2016 INTERNATIONAL CONGRESS ON COMPUTATION ALGORITHMS IN ENGINEERING (ICCAE 2016), 2016, : 100 - 106
  • [42] Analysis of Security Protocol Based on Petri Nets
    Liu, Fengli
    Han, Wei
    Jiang, Mingyue
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 48 - 51
  • [43] Security Protocol Analysis Based on Rewriting Approximation
    Liu, Nan
    Zhu, Wen-ye
    Zhu, Yue-fei
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 318 - 322
  • [44] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [45] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    Science in China(Series F:Information Sciences), 2004, (02) : 199 - 220
  • [46] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY
    Vennela, G. Sai
    Varun, N. Venkata
    Neelima, N.
    Priya, L. Sai
    Yeswanth, J.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279
  • [47] The Haar Analysis of Nonlinearity Cryptographic Security Criterion
    Rafiq, H. M.
    Siddiqi, M. U.
    PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 101 - 105
  • [48] Security Investment Over Networks with Bounded Rational Agents: Analysis and Distributed Algorithm
    Hughes, Jason
    Chen, Juntao
    2023 PROCEEDINGS OF THE CONFERENCE ON CONTROL AND ITS APPLICATIONS, CT, 2023, : 72 - 79
  • [49] A Review of Cloud Security Based on Cryptographic Mechanisms
    Abd, Sura Khalil
    Al-Haddad, S. A. R.
    Hashim, Fazirulhisyam
    Abdullah, Azizol
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 106 - 111
  • [50] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    Science in China Series F: Information Sciences, 2004, 47 : 199 - 220