首页> 外文OA文献 >The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols
【2h】

The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols

机译:密钥建立协议安全性证明的重要性:Jan-Chen,Yang-Shen-Shieh,Kim-Huh-Hwang-Lee,Lin-Sun-Hwang和Yeh-Sun协议的形式分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We revisit recent work of Choo, Boyd, Hitchcock, & Maitland (2004) where they utilize the Bellare, Pointcheval, & Rogaway (2000) computational complexity proof model in a machine specification and analysis (using an automated model checker -- SHVT) for provably-secure key establishment protocol analysis. We then examine several key establishment protocols without proofs of security, namely: protocols due to Jan & Chen (2004), Yang, Shen, & Shieh (1999), Kim, Huh, Hwang, & Lee (2004), Lin, Sun, & Hwang (2000), and Yeh & Sun (2002). Using these protcols as case studies, we demonstrate previously unpublished flaws in these protocols. We may speculate that such errors could have been found by protocol designers if proofs of security were to be constructed, and hope this work will encourage future protocol designers to provide proofs of security.
机译:尽管在确保协议实施者关于密钥建立协议的安全性方面的证明很重要,但是许多协议设计者仍无法提供任何安全性证明。在协议的发布和/或实施之后很长时间发现的缺陷将削弱关键建立协议的可信度。我们回顾了Choo,Boyd,Hitchcock和Maitland(2004)的最新工作,他们利用Bellare,Pointcheval和Rogaway(2000)在机器规格和分析中使用了计算复杂性证明模型(使用自动模型检查器-SHVT),用于可证明安全的密钥建立协议分析。然后,我们研究了几种没有安全性证明的关键建立协议,即:Jan和Chen(2004),Yang,Shen和Shieh(1999),Kim,Huh,Hwang和Lee(2004),Lin,Sun, &Hwang(2000)和Yeh&Sun(2002)。使用这些协议作为案例研究,我们证明了这些协议中以前未公开的缺陷。我们可能会推测,如果要构造安全性证明,则可能会由协议设计者发现此类错误,并希望这项工作会鼓励未来的协议设计者提供安全性证明。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号