SSMCI:verification mechanism for security protocols centered on the attacker
A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established a...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017208/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539543199645696 |
---|---|
author | Wen GU Ji-hong HAN Lin YUAN |
author_facet | Wen GU Ji-hong HAN Lin YUAN |
author_sort | Wen GU |
collection | DOAJ |
description | A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool. |
format | Article |
id | doaj-art-e460392a4735467e9bb86ecd32c1977d |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-10-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-e460392a4735467e9bb86ecd32c1977d2025-01-14T07:13:15ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-10-013817518859713057SSMCI:verification mechanism for security protocols centered on the attackerWen GUJi-hong HANLin YUANA automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017208/security protocolattacker modelstate expansion |
spellingShingle | Wen GU Ji-hong HAN Lin YUAN SSMCI:verification mechanism for security protocols centered on the attacker Tongxin xuebao security protocol attacker model state expansion |
title | SSMCI:verification mechanism for security protocols centered on the attacker |
title_full | SSMCI:verification mechanism for security protocols centered on the attacker |
title_fullStr | SSMCI:verification mechanism for security protocols centered on the attacker |
title_full_unstemmed | SSMCI:verification mechanism for security protocols centered on the attacker |
title_short | SSMCI:verification mechanism for security protocols centered on the attacker |
title_sort | ssmci verification mechanism for security protocols centered on the attacker |
topic | security protocol attacker model state expansion |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017208/ |
work_keys_str_mv | AT wengu ssmciverificationmechanismforsecurityprotocolscenteredontheattacker AT jihonghan ssmciverificationmechanismforsecurityprotocolscenteredontheattacker AT linyuan ssmciverificationmechanismforsecurityprotocolscenteredontheattacker |