Study on Strand Space Model Theory

来源 :计算机科学技术学报 | 被引量 : 0次 | 上传用户:zeng007008
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The growing interest in the application of formal methods of cryptographic pro-tocol analysis has led to the development of a number of different ways for analyzing protocol. Inthis paper, it is strictly proved that if for any strand, there exists at least one bundle containingit, then an entity authentication protocol is secure in strand space model (SSM) with some smallextensions. Unfortunately, the results of attack scenario demonstrate that this protocol and the Yahalom protocol and its modification are de facto insecure. By analyzing the reasons of failure offormal inference in strand space model, some deficiencies in original SSM are pointed out. In orderto break through these limitations of analytic capability of SSM, the generalized strand space model(GSSM) induced by some protocol is proposed. In this model, some new classes of strands, oraclestrands, high order oracle strands etc., are developed, and some notions are formalized strictly in GSSM, such as protocol attacks, valid protocol run and successful protocol run. GSSM can thenbe used to further analyze the entity authentication protocol. This analysis sheds light on why thisprotocol would be vulnerable while it illustrates that GSSM not only can prove security protocolcorrect, but also can be efficiently used to construct protocol attacks. It is also pointed out thatusing other protocol to attack some given protocol is essentially the same as the case of using themost of protocol itself.
其他文献
通过对高压电机振动故障的分析,指出了对设备运行效率的影响.在实际工作中采用的查找和处理方法,解决了设备运行中的问题,满足了生产的实际情况.
This paper proposes an algorithm named WLFVC, which is a fully distributed wireless packet scheduling algorithm based on LFVC (Leap Forward Virtual Clock), to p
期刊
Polyethylene (PE) grafting 4-vinylpyridine copolymers has been produced as powders of different rushes by the irradiation method. After treatment with methylalu
With the massage passing interface, a parallel solution method was proposed for the simulation of the elliptic mild slope equation, and implemented numerically
In this paper, cavitation damage of turbines is firstly analyzed and predicated from the view point of system engineering by use of the grey system theory. A de
The majority of researches on content-based retrieval focused on visual media.However audio is also an important medium and information carrier from the viewpoi
Rapidly solidified Al87Ni7Cu3Nd3 metallic glasses, prepared by using melt spinning,were treated under both isothermal and non-isothermal regime. The amorphous r
Over the forty-year history of interactive computer graphics, there have been con-tinuous advances, but at some stage this progression must terminate with image
Mining frequent itemsets from large databases has played an essential role inmany data mining tasks. It is also important to maintain the discovered frequent it
本文针对工程机械冬季的维护保养问题进行探讨。 This article discusses the maintenance of construction machinery in winter.