作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2009, Vol. 35 ›› Issue (5): 171-174. doi: 10.3969/j.issn.1000-3428.2009.05.059

• 安全技术 • 上一篇    下一篇

安全协议一阶逻辑模型中攻击重构的实现

张 超1,韩继红1,王亚弟1,朱玉娜1,陈欣辉2   

  1. (1. 解放军信息工程大学电子技术学院,郑州 450004;2. 酒泉卫星发射中心,酒泉 732750)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2009-03-05 发布日期:2009-03-05

Implementation of Attack Reconstruction in First-order Logic Model for Security Protocols

ZHANG Chao1, HAN Ji-hong1, WANG Ya-di1, ZHU Yu-na1, CHEN Xin-hui2   

  1. (1. Institute of Electronic Technology, PLA Information Engineering Univ., Zhengzhou 450004; 2. Jiuquan Satellite Launch Center, Jiuquan 732750)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-03-05 Published:2009-03-05

摘要: 针对安全协议一阶逻辑模型不能够给出易于理解的攻击序列的问题,对安全协议一阶逻辑模型进行扩展,对逻辑推理中的规则及合一化操作进行分类,给出操作置换规则,在此基础上开发能对攻击进行重构的协议验证原型系统。通过具体的应用例子对其秘密性进行形式化验证,结果表明系统能给出易于理解的攻击序列。

关键词: 攻击序列重构, 安全协议, 一阶逻辑模型

Abstract: According to the problem that first-order logic model for security protocols can not give the understandable attack sequence, this paper introduces an improved model, which classifies the rules and unify operations, presents operation replacement rules, and develops a new system that can reconstruct attack sequence. Example with the simplified Needham-Schroeder protocol shows the effectiveness of the system.

Key words: reconstruction of attack sequence, security protocols, first-order logic model

中图分类号: