Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2006, Vol. 32 ›› Issue (3): 164-166.

• Security Technology • Previous Articles     Next Articles

Running-mode Analysis of Symlified SET Purchase Protocol

WU Jianyao1,2, ZHANG Yuqing1, YANG Bo2   

  1. 1. National Computer Network Intrusion Protection Center, Chinese Academy of Sciences, Beijing 100043;2. National Key Laboratory of ISN, Xidian University, Xi’an 710071
  • Online:2006-02-05 Published:2006-02-05

SET 支付协议的形式化分析与改进

吴建耀 1,2,张玉清1,杨波 2   

  1. 1.中科院研究生院国家计算机网络入侵防范中心,北京 100043;2.西安电子科技大学ISN 国家重点实验室,西安 710071

Abstract: The simplified SET purchase protocol is analyzed using a formal analysis method called the approach of the running-mode analysis. Byanalyzing the protocol, six different types of attack are found, of which four types of attack are first found. An in-depth analysis and classify is also made to find the leaks of the protocol. Finally, some improvements are made to avoid these attacks effectively, which improve the security of the protocol.

Key words: SET purchase protocol; Running-mode analysis; Formal analysis

摘要: 使用运行模式法对SET 支付协议的简化版本即Lu-Smolka 协议进行了形式化分析,找到了6 种不同的攻击形式,其中4 种是新发现的攻击,通过对这6 种攻击形式的深入分析和分类,发现了原协议中存在的漏洞,最后对该协议进行了改进,从而有效避免了以上6 种攻击,提高了协议的安全性。

关键词: SET 支付协议;运行模式分析法;形式化分析