首页> 外文学位 >Cryptographic protocol specification and analysis using coloured Petri nets and Java.
【24h】

Cryptographic protocol specification and analysis using coloured Petri nets and Java.

机译:使用彩色Petri网和Java进行密码协议规范和分析。

获取原文
获取原文并翻译 | 示例

摘要

With the great expansion of our communication system over the last decade, cellular phone and Internet users are demanding better mechanisms to provide privacy and authentication. Cryptographic protocols are being applied to protect these sensitive areas of communications. The design of these protocols must be done error-free and resistant to attacks.;Formal analysis methods have been developed to verify the security properties of these cryptographic protocols. This thesis applies coloured Petri nets (CPN) to model protocols and intruders. From the resulting model, a security analysis may be conducted to determine the reachability of an undesirable end state from an initial state. As the reachability analysis is not feasible manually, automated analysis has been implemented.;An integrated software tool has been developed with the Java programming language to ensure that security objectives of cryptographic protocols are met. The tool has a graphical user interface as a front-end, rendering it user-friendly. This formal analysis tool permits a cryptographic protocol designer to specify a protocol using a drawing tool, to conduct a detailed security analysis, and to graphically simulate the operation of the protocol or its weaknesses.;To confirm that the software tool functions properly, security analysis was conducted on two authentication protocols: the Unique Challenge/Response protocol of the IS-41C standard and the Needham-Schroeder protocol. The published weaknesses for both protocols were confirmed by the software tool through analysis and interactive simulation.;After specifying a cryptographic protocol with a CPN diagram, the software tool succeeded in verifying the security properties of the protocol simply and quickly.
机译:在过去十年中,随着我们通信系统的巨大扩展,蜂窝电话和Internet用户要求更好的机制来提供隐私和身份验证。正在应用密码协议来保护这些敏感的通信区域。这些协议的设计必须做到无错误且能抵抗攻击。;已经开发出正式的分析方法来验证这些密码协议的安全性。本文将彩色Petri网(CPN)应用于协议和入侵者模型。根据结果​​模型,可以进行安全分析,从初始状态确定不希望的最终状态的可达性。由于无法手动进行可达性分析,因此已实现了自动分析。;已开发了一种集成软件工具,并使用Java编程语言来确保满足加密协议的安全性目标。该工具具有图形用户界面作为前端,使其易于使用。这种形式化的分析工具允许密码协议设计者使用绘图工具指定协议,进行详细的安全性分析,并以图形方式模拟协议的操作或其弱点。要确认软件工具是否正常运行,请进行安全性分析。是在两种身份验证协议上进行的:IS-41C标准的唯一质询/响应协议和Needham-Schroeder协议。该软件工具通过分析和交互式仿真证实了这两种协议的已发布弱点。;在使用CPN图指定了加密协议后,该软件工具成功地简单,快速地验证了该协议的安全性。

著录项

  • 作者

    Edwards, Kim.;

  • 作者单位

    Queen's University (Canada).;

  • 授予单位 Queen's University (Canada).;
  • 学科 Engineering Electronics and Electrical.;Computer Science.
  • 学位 M.Sc.(Eng)
  • 年度 1998
  • 页码 125 p.
  • 总页数 125
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号