...
首页> 外文期刊>Operating systems review >An approach to finding the attacks on the cryptographic protocols
【24h】

An approach to finding the attacks on the cryptographic protocols

机译:An approach to finding the attacks on the cryptographic protocols

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

It is necessary to development the formal tools for verifying cryptographic protocols because of the subtlety of cryptographic protocols flaws; In terms of the notions of the restrictive channel and the equivalent message, this paper presents an approach that utilizes the substitution rules of messages and the deduction rules to prove whether the insecure states of the cryptographic protocols are reachable or not, and the analysis of several famous protocols shows the validity of the method.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号