首页> 外文期刊>The Journal of Systems and Software >A formal methodology for integral security design and verification of network protocols
【24h】

A formal methodology for integral security design and verification of network protocols

机译:用于网络协议的整体安全性设计和验证的正式方法

获取原文
获取原文并翻译 | 示例
       

摘要

In this work we propose a methodology for incorporating the verification of the security properties of network protocols as a fundamental component of their design. This methodology can be separated in two main parts: context and requirements analysis along with its informal verification: and formal representation of protocols and the corresponding procedural verification. Although the procedural verification phase does not require any specific tool or approach, automated tools for model checking and/or theorem proving offer a good trade-off between effort and results. In general, any security protocol design methodology should be an iterative process addressing in each step critical contexts of increasing complexity as result of the considered protocol goals and the underlying threats. The effort required for detecting flaws is proportional to the complexity of the critical context under evaluation, and thus our methodology avoids wasting valuable system resources by analyzing simple flaws in the first stages of the design process. In this work we provide a methodology in coherence with the step-by-step goals definition and threat analysis using informal and formal procedures, being our main concern to highlight the adequacy of such a methodology for promoting trust in the accordingly implemented communication protocols. Our proposal is illustrated by its application to three communication protocols: MANA III, WEP's Shared Key Authentication and CHAT-SRP.
机译:在这项工作中,我们提出了一种方法,将网络协议的安全属性验证作为其设计的基本组成部分。该方法可以分为两个主要部分:上下文和需求分析及其非正式验证;以及协议的正式表示形式和相应的过程验证。尽管过程验证阶段不需要任何特定的工具或方法,但是用于模型检查和/或定理证明的自动化工具可以在努力和结果之间取得良好的平衡。通常,任何安全协议设计方法论都应该是一个迭代过程,该过程在每个步骤中都要考虑到由于考虑到的协议目标和潜在威胁而导致复杂性不断提高的关键情况。检测缺陷所需的工作与评估中关键上下文的复杂程度成正比,因此我们的方法避免了在设计过程的第一阶段通过分析简单缺陷来避免浪费宝贵的系统资源。在这项工作中,我们提供了一种使用非正式和正式程序与逐步目标定义和威胁分析相一致的方法,这是我们主要关注的重点,是强调这种方法是否足以促进对相应实施的通信协议的信任。我们的建议通过将其应用于三种通信协议来说明:MANA III,WEP的共享密钥身份验证和CHAT-SRP。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号