【24h】

A Tool of Analysis and Implementation of Security Protocols on Distributed Systems

机译:分析和实现分布式系统安全协议的工具

获取原文
获取原文并翻译 | 示例

摘要

In this paper we present an analysis and automatic implementation tool of security protocols based on Techniques of Formal Description. A sufficiently complete and concise formal specification that has allowed us to define the state machine that corresponds to a cryptographic protocol has been designed to achieve our goals. This forma! specification also makes it possible to incorporate in a flexible way the mechanisms and functions of security. Our system makes it possible to automatically translate formal specifications of protocols to a group of derivation Prolog rules. Our work improves the solution first proposed by J.K. Millen in [1]. We study the vulnerability of security protocols exploring, in an automatic way, all its possible behaviors in agreement both with their formal specification and with the information potentially recorded by an intruder. As a result of our work, for example, the vulnerability of security protocols that is already proven in a theoretical way (Needhman-Schroeder protocol or SSH or AKA protocols) can be proven and analyzed automatically starting from the translation to rules of those protocols. Additionally, our tool incorporates a new concept of implementation of protocols based on the interpretation of formal specifications on distributed systems.
机译:本文提出了一种基于形式化描述技术的安全协议分析和自动实现工具。设计了足够完整和简洁的形式规范,使我们能够定义与密码协议相对应的状态机,以实现我们的目标。这个形式!规范还使得可以灵活地结合安全机制和功能。我们的系统可以自动将协议的正式规范转换为一组派生Prolog规则。我们的工作改进了J.K.最初提出的解决方案。 Millen在[1]中。我们研究安全协议的漏洞,以自动方式探究其所有可能的行为,并与它们的正式规范和入侵者可能记录的信息相一致。例如,通过我们的工作,可以从理论上将安全协议的脆弱性(Needhman-Schroeder协议或SSH或AKA协议)证明并自动对其进行分析,以证明这些脆弱性。此外,我们的工具基于对分布式系统上正式规范的解释,结合了协议实现的新概念。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号