首页> 外文会议>IEEE Symposium on Security and Privacy >Automated analysis of cryptographic protocols using Mur/spl phi/
【24h】

Automated analysis of cryptographic protocols using Mur/spl phi/

机译:使用MUR / SPL PHI的加密协议自动分析/

获取原文
获取外文期刊封面目录资料

摘要

A methodology is presented for using a general-purpose state enumeration tool, Mur/spl phi/, to analyze cryptographic and security-related protocols. We illustrate the feasibility of the approach by analyzing the Needham-Schroeder (1978) protocol, finding a known bug in a few seconds of computation time, and analyzing variants of Kerberos and the faulty TMN protocol used in another comparative study. The efficiency of Mur/spl phi/ also allows us to examine multiple terms of relatively short protocols, giving us the ability to detect replay attacks, or errors resulting from confusion between independent execution of a protocol by independent parties.
机译:使用通用状态枚举工具,MUR / SPL PHI /,分析加密和安全相关协议的方法。我们通过分析Creferham-Schroeder(1978)协议来说明该方法的可行性,在几秒钟内找到了已知的错误,并分析了Kerberos的变型和另一个比较研究中使用的故障TMN协议。 MUR / SPL PHI /也允许我们检查多个相对较短的协议的术语,使我们能够检测独立方面独立执行协议之间的混淆而导致的重播攻击或错误。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号