首页> 外文会议>Developments in Photovoltaic Electricity Production >Role based specification and security analysis of cryptographic protocols using asynchronous product automata
【24h】

Role based specification and security analysis of cryptographic protocols using asynchronous product automata

机译:使用异步产品自动机的基于角色的加密协议规范和安全性分析

获取原文
获取原文并翻译 | 示例

摘要

Cryptographic protocols are formally specified as a system of protocol agents using asynchronous product automata (APA). APA are a universal and very flexible operational description concept for communicating automata. Their specification, analysis and verification is supported by the SH-verification tool (SHVT). The local state of each agent is structured in several components describing its knowledge of keys, its "view" of the protocol and the goals to be reached within the protocol. Communication is modeled by adding messages to and removing them from a shared state component network. Cryptography is modeled by symbolic functions with certain properties. In addition to the regular protocol agents an intruder is specified, which has no access to the agents' local states but to the network. The intruder may intercept messages and create new ones based on his initial knowledge and on what he can extract from intercepted messages. Violations of the security goals can be found by state space analysis performed by the SHVT. The method is demonstrated using the symmetric Needham-Schroeder protocol, and an attack is presented that does not involve compromised session keys. Our approach defers from others in that protocol specifications do not use implicit assumptions, thus protocol security does not depend on whether some implicit assumptions made are reasonable for a particular environment. Therefore, our protocol specifications explicitly provide relevant information for secure implementations.
机译:加密协议被正式指定为使用异步产品自动机(APA)的协议代理系统。 APA是用于传达自动机的通用且非常灵活的操作描述概念。 SH验证工具(SHVT)支持其规格,分析和验证。每个代理的本地状态由几个组件构成,这些组件描述其密钥知识,协议的“视图”以及协议内要实现的目标。通过向共享状态组件网络中添加消息或从共享状态组件网络中删除消息来对通信进行建模。密码学是通过具有某些属性的符号函数建模的。除了常规协议代理程序外,还指定了一个入侵者,它无法访问代理程序的本地状态,而只能访问网络。入侵者可以拦截消息并根据其最初的知识以及他可以从拦截的消息中提取的内容来创建新消息。可以通过SHVT执行的状态空间分析来发现违反安全目标的情况。使用对称Needham-Schroeder协议演示了该方法,并提出了一种不涉及损害的会话密钥的攻击。我们的方法与其他协议不同,因为协议规范不使用隐式假设,因此协议安全性不取决于某些隐式假设对于特定环境是否合理。因此,我们的协议规范明确提供了有关安全实施的相关信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号