Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2007, Vol. 33 ›› Issue (20): 137-138. doi: 10.3969/j.issn.1000-3428.2007.20.047

• Security Technology • Previous Articles     Next Articles

Automatic Design of Security Protocols

ZHOU Ya-jie, GUAN Huan-mei, CHEN Ping, ZHANG Jing-wei   

  1. (Computer Center, Wuhan University, Wuhan 430072)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-10-20 Published:2007-10-20

安全协议的自动化设计

周雅洁,关焕梅,陈 萍,张晶伟   

  1. (武汉大学计算中心,武汉 430072)

Abstract: This paper describes a model of automatic generation and reduction of security protocols. In the first stage, based on the system specification, it generates candidate protocols and reduces these protocols with syntactical restriction rules and early-pruning by simple impersonation attack. In the second stage, it optimizes the protocols by reduction techniques based on strand space model and gains the optimal protocols.

Key words: security protocols, automatic design, strand space

摘要: 阐述了安全协议的自动生成-约简-优化模型。在第1阶段,依据系统规范的要求生成候选协议,并用简单的句法约束规则和基于简单冒充的早期删减规则对候选协议进行约简。第2阶段,以串空间理论为依据制定删减规则,对以上候选协议进行进一步的优化,生成符合安全需求的正确协议。

关键词: 安全协议, 自动化设计, 串空间

CLC Number: