首页> 外文会议>SysSec Workshop >Demarcation of Security in Authentication Protocols
【24h】

Demarcation of Security in Authentication Protocols

机译:身份验证协议中的安全划分

获取原文

摘要

Security analysis of communication protocols is a slippery business, many ``secure'' protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis easier and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of {binding sequence} as a security primitive. A emph{binding sequence}, roughly speaking, is the only required security property of an authentication protocol. All other authentication goals, the correctness requirements, can be derived from the {binding sequence}.
机译:通信协议的安全性分析是一个湿滑的业务,许多``“安全”的协议后来是不安全的。其中,两个抱怨更频繁:安全模型中的安全和不合适假设的定义不足。在我们的经验中,这种事态的一个主要原因是安全性和正确性的明显重叠,这可能导致许多邋sturity的定义和安全模型。虽然实际上没有固有的需求,但实际上,这种分离是显着的。它使安全性分析更容易,使我们能够使用细粒度定义安全目标。我们通过将{绑定序列}的概念引入安全原语来呈现一种这样的分离。粗略地说,Emph {绑定序列}粗略地是认证协议的唯一所需的安全性。所有其他身份验证目标,正确性要求,可以从{绑定序列}派生。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号