SSMCI:verification mechanism for security protocols centered on the attacker

A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established a...

Full description

Saved in:
Bibliographic Details
Main Authors: Wen GU, Ji-hong HAN, Lin YUAN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017208/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539543199645696
author Wen GU
Ji-hong HAN
Lin YUAN
author_facet Wen GU
Ji-hong HAN
Lin YUAN
author_sort Wen GU
collection DOAJ
description A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool.
format Article
id doaj-art-e460392a4735467e9bb86ecd32c1977d
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-e460392a4735467e9bb86ecd32c1977d2025-01-14T07:13:15ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-10-013817518859713057SSMCI:verification mechanism for security protocols centered on the attackerWen GUJi-hong HANLin YUANA automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017208/security protocolattacker modelstate expansion
spellingShingle Wen GU
Ji-hong HAN
Lin YUAN
SSMCI:verification mechanism for security protocols centered on the attacker
Tongxin xuebao
security protocol
attacker model
state expansion
title SSMCI:verification mechanism for security protocols centered on the attacker
title_full SSMCI:verification mechanism for security protocols centered on the attacker
title_fullStr SSMCI:verification mechanism for security protocols centered on the attacker
title_full_unstemmed SSMCI:verification mechanism for security protocols centered on the attacker
title_short SSMCI:verification mechanism for security protocols centered on the attacker
title_sort ssmci verification mechanism for security protocols centered on the attacker
topic security protocol
attacker model
state expansion
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017208/
work_keys_str_mv AT wengu ssmciverificationmechanismforsecurityprotocolscenteredontheattacker
AT jihonghan ssmciverificationmechanismforsecurityprotocolscenteredontheattacker
AT linyuan ssmciverificationmechanismforsecurityprotocolscenteredontheattacker