首页> 外文期刊>Journal of computer networks and communications >Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method
【24h】

Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

机译:使用基于解释函数的方法对SET和NSL协议进行形式化分析

获取原文
获取外文期刊封面目录资料

摘要

Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.
机译:Internet上的大多数应用程序(例如,电子银行和电子商务)都使用SET和NSL协议来保护客户端和服务器之间的通信通道。然后,至关重要的是确保这些协议遵守某些安全属性,例如机密性,身份验证和完整性。在本文中,我们针对机密性(保密)属性分析了SET和NSL协议。为了执行此分析,我们使用基于解释函数的方法。基于解释函数的技术背后的主要思想是提供足够的条件,以保证加密协议能够遵守保密性。提议条件的灵活性允许验证诸如SET和NSL之类的日常生活协议。同样,可以在不同的假设下使用此方法,例如各种入侵者的能力,包括密码原语的代数性质。例如,使用和不使用同态属性来分析NSL协议。我们还使用SET协议显示了此方法对纠正分析过程中发现的弱点和问题的有用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号