首页> 外文会议>Biennial symposium on communications >Computer Analysis of Cryptographic Protocols Using Coloured Petri Nets
【24h】

Computer Analysis of Cryptographic Protocols Using Coloured Petri Nets

机译:使用有色Petri网的加密协议的计算机分析

获取原文

摘要

This paper extends the Petri net methodology for the specification and analysis of cryptographic protocols. In particular, software to perform automated state-reachability analysis has been developed. The intruder and each legitimate protocol entity is modeled by a Petri Net Object (PNO). The goal of the analysis is to determien whether a cryptographic protocol can withstand the attacks of the specified intruder. hand analysis is not practical in most cases because of the large number of actions the intruder may pursue. However, exhaustive state analysis on a modern work-station is feasible for many protocols. Previous work is extended to model multiple iteration and parallel session attacks. The following protocols have been examined: a simple one-way authentication protocol, the handset authentication protocol used in CT2 and CT2Plus, a three-pass mutual authentication protocol from a proposal to ISO, and the Temporary Mobile Terminal Identity establishment protocol from the recommendations for FPLMTS.
机译:本文扩展了Petri网方法,用于规范和分析密码协议。特别地,已经开发了用于执行自动状态可达性分析的软件。入侵者和每个合法协议实体均由Petri网对象(PNO)建模。分析的目的是确定加密协议是否可以承受指定入侵者的攻击。由于入侵者可能会采取大量行动,因此在大多数情况下进行手动分析是不切实际的。但是,在现代工作站上进行详尽的状态分析对于许多协议都是可行的。先前的工作已扩展为对多个迭代和并行会话攻击进行建模。已经研究了以下协议:简单的单向身份验证协议,CT2和CT2Plus中使用的手机身份验证协议,从提案到ISO的三遍双向身份验证协议以及根据以下建议获得的临时移动终端身份建立协议: FPLMTS。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号