SSMCI:verification mechanism for security protocols centered on the attacker
A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established a...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2017-10-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017208/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool. |
|---|---|
| ISSN: | 1000-436X |