首页> 外文OA文献 >Building blocks for secure services: authenticated key transport and rational exchange protocols
【2h】

Building blocks for secure services: authenticated key transport and rational exchange protocols

机译:安全服务的构建块:认证的密钥传输和合理的交换协议

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

This thesis is concerned with two security mechanisms: authenticated key transport and rational exchange protocols. These mechanisms are potential building blocks in the security architecture of a range of different services. Authenticated key transport protocols are used to build secure channels between entities, which protect their communications against eaves-dropping and alteration by an outside attacker. In contrast, rational exchange protocols can be used to protect the entities involved in an exchange transaction from each other. This is important, because often the entities do not trust each other, and both fear that the other will gain an advantage by misbehaving. Rational exchange protocols alleviate this problem by ensuring that a misbehaving party cannot gain any advantages. This means that misbehavior becomes uninteresting and it should happen only rarely. The thesis is focused on the construction of formal models for authenticated key transport and rational exchange protocols. In the first part of the thesis, we propose a formal model for key transport protocols, which is based on a logic of belief. Building on this model, we also propose an original systematic protocol construction approach. The main idea is that we reverse some implications that can be derived from the axioms of the logic, and turn them into synthesis rules. The synthesis rules can be used to construct a protocol and to derive a set of assumptions starting from a set of goals. The main advantage is that the resulting protocol is guaranteed to be correct in the sense that all the specified goals can be derived from the protocol and the assumptions using the underlying logic. Another important advantage is that all the assumptions upon which the correctness of the protocol depends are made explicit. The protocol obtained in the synthesis process is an abstract protocol, in which idealized messages that contain logical formulae are sent on channels with various access properties. The abstract protocol can then be implemented in several ways by replacing the idealized messages and the channels with appropriate bit strings and cryptographic primitives, respectively. We illustrate the usage of the logic and the synthesis rules through an example: We analyze an authenticated key transport protocol proposed in the literature, identify several weaknesses, show how these can be exploited by various attacks, and finally, we redesign the protocol using the proposed systematic approach. We obtain a protocol that resists against the presented attacks, and in addition, it is simpler than the original one. In the second part of the thesis, we propose an original formal model for exchange protocols, which is based on game theory. In this model, an exchange protocol is represented as a set of strategies in a game played by the protocol parties and the network that they use to communicate with each other. We give formal definitions for various properties of exchange protocols in this model, including rationality and fairness. Most importantly, rationality is defined in terms of a Nash equilibrium in the protocol game. The model and the formal definitions allow us to rigorously study the relationship between rational exchange and fair exchange, and to prove that fairness implies rationality (given that the protocol satisfies some further usual properties), but the reverse is not true in general. We illustrate how the formal model can be used for rigorous verification of existing protocols by analyzing two exchange protocols, and formally proving that they satisfy the definition of rational exchange. We also present an original application of rational exchange: We show how the concept of rationality can be used to improve a family of micropayment schemes with respect to fairness without substantial loss in efficiency. Finally, in the third part of the thesis, we extend the concept of rational exchange, and describe how similar ideas can be used to stimulate the nodes of a self-organizing ad hoc network for cooperation. More precisely, we propose an original approach to stimulate the nodes for packet forwarding. Like in rational exchange protocols, our design does not guarantee that a node cannot deny packet forwarding, but it ensures that it cannot gain any advantages by doing so. We analyze the proposed solution analytically and by means of simulation.
机译:本文涉及两种安全机制:认证密钥传输和合理交换协议。这些机制是一系列不同服务的安全体系结构中的潜在构建块。经过身份验证的密钥传输协议用于在实体之间建立安全通道,从而保护其通信免受外部攻击者的窃听和篡改。相反,可以使用理性交换协议来保护参与交换交易的实体彼此之间。这很重要,因为实体通常不相互信任,并且双方都担心彼此会通过行为不当而获得好处。理性的交换协议通过确保行为不当的一方不会获得任何好处来缓解此问题。这意味着不当行为变得无关紧要,应该很少发生。本文的重点是用于认证密钥传输和合理交换协议的形式化模型的构建。在论文的第一部分,我们提出了一种基于信念逻辑的密钥传输协议的形式化模型。在此模型的基础上,我们还提出了一种原始的系统协议构建方法。主要思想是,我们反转一些可以从逻辑公理得出的含意,并将其转化为综合规则。综合规则可用于构建协议并从一组目标开始得出一组假设。主要优点是,从可以使用基本逻辑从协议和假设中得出所有指定目标的意义上,可以保证所得协议是正确的。另一个重要的优点是明确了协议正确性所依赖的所有假设。在综合过程中获得的协议是抽象协议,其中包含逻辑公式的理想化消息在具有各种访问属性的通道上发送。然后,可以通过分别用适当的位字符串和加密原语替换理想化的消息和通道,以几种方式来实现抽象协议。我们通过一个示例说明了逻辑和综合规则的用法:我们分析了文献中提出的经过身份验证的密钥传输协议,确定了几个弱点,展示了各种攻击如何利用这些弱点,最后,我们使用建议的系统方法。我们获得了一种可以抵抗提出的攻击的协议,此外,它比原始协议更简单。在论文的第二部分,我们提出了一种基于博弈论的交换协议原始形式模型。在此模型中,交换协议表示为协议方和他们用来相互通信的网络玩的游戏中的一组策略。我们在此模型中给出了交换协议各种属性的正式定义,包括合理性和公平性。最重要的是,理性是根据协议博弈中的纳什均衡来定义的。该模型和形式定义使我们能够严格地研究理性交换与公平交换之间的关系,并证明公平暗示着合理性(假定该协议满足其他一些通常的性质),但反过来通常是不正确的。我们通过分析两个交换协议,并正式证明它们满足理性交换的定义,来说明如何将正式模型用于现有协议的严格验证。我们还介绍了理性交易的原始应用:我们展示了如何在不损失效率的前提下,将合理性的概念用于改善一系列小额支付计划的公平性。最后,在论文的第三部分中,我们扩展了理性交换的概念,并描述了如何使用相似的思想来激发自组织自组织网络进行合作的节点。更准确地说,我们提出了一种原始方法来刺激节点进行数据包转发。像在理性交换协议中一样,我们的设计不能保证节点不能拒绝数据包转发,但是可以确保这样做不会获得任何优势。我们通过仿真和分析的方法分析提出的解决方案。

著录项

  • 作者

    Buttyán Levente;

  • 作者单位
  • 年度 2002
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号