【24h】

Verification of Security Protocols

机译:验证安全协议

获取原文

摘要

Security protocols are short programs aiming at securing communications overa network. They are widely used in our everyday life. They may achieve var-ious goals depending on the application: confidentiality, authenticity, privacy,anonymity, fairness, etc. Their verification using symbolic models has shown itsinterest for detecting attacks and proving security properties. A famous exampleis the Needham-Schroeder protocol [23] on which G. Lowe discovered a flaw 17years after its publication [20]. Secrecy preservation has been proved to be co-NP-complete for a bounded number of sessions [24], and decidable for an unboundednumber of sessions under some additional restrictions (e.g. [3,12,13,25]). Manytools have also been developed to automatically verify cryptographic protocolslike [8,21].
机译:安全协议是旨在保护通信的短节目。它们广泛用于日常生活中。他们可以根据应用程序实现var-ious目标:机密性,真实性,隐私,匿名,公平等。它们使用符号模型的验证已经显示了检测攻击和证明安全性质的Ittreest。一个着名的榜样,Crederham-Schroeder协议[23]在出版后,G. Lowe发现了一个缺陷17年[20]。被证明的保密保存是有限的会话[24]的合作,并在一些额外限制下对未经判定的会话判定(例如[3,12,13,25])。也已开发出多摩机以自动验证加密协议[8,21]。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号