首页> 外文期刊>Computer standards & interfaces >A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols
【24h】

A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols

机译:Dolev-Yao威胁环境的结构化操作语义建模及其加密协议的组成

获取原文
获取原文并翻译 | 示例
       

摘要

In the areas of computer security and cryptographic protocols a standard model for describing the malicious behaviour of adversaries is the Dolev-Yao threat model. In formal analysis of complex, reactive and concurrent communication systems, a well-researched algebraic process approach is Milner's Calculus of Communicating Systems (CCS) which has the semantic foundation underpinned by Plotkin's structured operational semantics (SOS). In this article we provide a CCS-SOS modelling of the Dolev-Yao threat environment and its composition with the CCS description of a cryptographic protocol. For a given protocol, we attempt to discover security flaws by examining whether there is any difference between the SOS transition behaviours of the protocol descriptions which has and has not been composed with the malicious environment. The intuitively appealing modelling shows a suitability for the well-researched CCS-SOS-based algebraic process approach being applied to formal analysis of cryptographic protocols.
机译:在计算机安全性和密码协议领域,用于描述对手的恶意行为的标准模型是Dolev-Yao威胁模型。在对复杂的,反应性的和并发的通信系统进行形式化分析时,一种经过深入研究的代数过程方法是米尔纳的通信系统演算(CCS),其语义基础由Plotkin的结构化操作语义(SOS)支撑。在本文中,我们使用密码协议的CCS描述提供了Dolev-Yao威胁环境的CCS-SOS建模及其组成。对于给定的协议,我们试图通过检查协议描述的SOS转换行为之间是否存在与恶意环境有关的差异来发现安全漏洞。直观吸引人的模型表明,将经过充分研究的基于CCS-SOS的代数处理方法应用于加密协议的形式分析是合适的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号