首页> 外文会议>Formal techniques for distributed systems >On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryptographic Protocols
【24h】

On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryptographic Protocols

机译:动态跟踪生成和文本跟踪分析及其在密码协议分析中的应用

获取原文
获取原文并翻译 | 示例

摘要

Many model checking methods have been developed and applied to analyze cryptographic protocols. Most of them can analyze only one attack trace of a found attack. In this paper, we propose a very simple but practical model checking methodology for the analysis of cryptographic protocols. Our methodology offers an efficient analysis of all attack traces for each found attack, and is independent to model checking tools. It contains two novel techniques which are on-the-fly trace generation and textual trace analysis. In addition, we apply our method to two case studies which are TMN authenticated key exchanged protocol and Micali's contract signing protocol. Surprisingly, it turns out that our simple method is very efficient when the numbers of traces and states are large. Also, we found many new attacks in those protocols.
机译:已经开发了许多模型检查方法并将其应用于分析密码协议。他们中的大多数人只能分析找到的攻击的一条攻击痕迹。在本文中,我们提出了一种非常简单但实用的模型检查方法来分析密码协议。我们的方法可为发现的每种攻击提供对所有攻击踪迹的有效分析,并且独立于模型检查工具。它包含两种新颖的技术,即即时跟踪生成和文本跟踪分析。此外,我们将我们的方法应用于两个案例研究,这两个案例是TMN身份验证密钥交换协议和Micali的合同签署协议。令人惊讶的是,事实证明,当迹线和状态的数量很大时,我们的简单方法非常有效。此外,我们在这些协议中发现了许多新攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号