【24h】

Equal To The Task?

机译:等于任务?

获取原文
获取原文并翻译 | 示例

摘要

Many methods of analysing security protocols have been proposed, but most such methods rely on analysing a protocol running only a finite network. Some, however―notably, data independence, the strand spaces model, and the rank functions model―can be used to prove correctness of a protocol running on an unbounded network. Roscoe and Broadfoot in [17] show how data independence techniques may be used to verify a security protocol running on an unbounded network. They also consider a weakness inherent in the RSA algorithm, discovered by Franklin and Reiter, and show that their data independence approach cannot deal with an intruder endowed with the ability to exploit this weakness. In this paper, we show that neither can the use of honest ideals in the strand spaces model or the use of rank functions in the CSP model be easily adapted to cover such an intruder. In each case, the inequality tests required to model the new intruder cause problems when attempting to extend analysis of a finite network to cover an unbounded network. The results suggest that more work is needed on adapting the intruder model to allow for cryptographic attacks.
机译:已经提出了许多分析安全协议的方法,但是大多数这样的方法依赖于分析仅运行有限网络的协议。但是,有些(尤其是数据独立性,链空间模型和秩函数模型)可以用来证明在无边界网络上运行的协议的正确性。 Roscoe和Broadfoot在[17]中展示了如何使用数据独立性技术来验证在无边界网络上运行的安全协议。他们还考虑了Franklin和Reiter发现的RSA算法固有的弱点,并表明他们的数据独立性方法无法处理具有利用此弱点能力的入侵者。在本文中,我们表明,在链空间模型中使用诚实的理想或在CSP模型中使用秩函数都不能轻易地适应此类入侵者。在每种情况下,当尝试将有限网络的分析扩展到无边界网络时,为新入侵者建模所需的不等式测试都会引起问题。结果表明,在适应入侵者模型以进行加密攻击方面还需要做更多的工作。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号