首页> 外文会议>IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust;World Computer Congress >COMPLEMENTING COMPUTATIONAL PROTOCOL ANALYSIS WITH FORMAL SPECIFICATIONS
【24h】

COMPLEMENTING COMPUTATIONAL PROTOCOL ANALYSIS WITH FORMAL SPECIFICATIONS

机译:用正式规格补充计算协议分析

获取原文

摘要

The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversary and the protocol entities. This allows a matching model to be used in both a machine-generated analysis and a human-generated computational proof. Using a protocol of Jakobsson and Pointcheval as a case study, it is demonstrated that flaws in the protocol could have been found with this approach, providing evidence that the combination of human and computer analysis can be more effective than either alone. As well as finding the known flaw, previously unknown flaws in the protocol are discovered by the automatic analysis.
机译:通过提供对反对派和协议实体的行动的正式规范,补充了Bellare和Rogaway的计算证明模型。 这允许在机器生成的分析和人生成的计算证据中使用匹配模型。 使用Jakobsson和Pointcheval的协议作为案例研究,证明了协议中的缺陷本方法可以发现,提供人和计算机分析的组合比单独的方式更有效。 除了找到已知的缺陷,通过自动分析发现协议中的先前未知的缺陷。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号