An approach which made use of running modes of two-party cryptographic protocols to analyze protocols was put forwarded in [1]. Through some counter-examples, we found flaws in the approach. In this paper, an efficient method is developed, which matchs faked messages with received set of attacks,messages in other run of protocol. Using the method, we found holes of some cryptographic protocols successly.%文献[1]提出用两方密码协议的运行模式对协议进行分析,文章证明谊方法未能列举出全部运行模式,因此一些协议的漏洞不能被发现.文章提出一种遍历分析法,让导致攻击成功的假冒消息遍历攻击者在各种情况下消息接收集来对协议进行分析,从而发现协议漏洞.
展开▼