Font Size: a A A

Safety Protocol Formal Analysis Of Theories And Methods

Posted on:2004-01-05Degree:DoctorType:Dissertation
Country:ChinaCandidate:H FanFull Text:PDF
GTID:1118360095955975Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The research of this thesis consists of the following three parts: basic theory , security protocol, and formal analysis of security protocol.In the first part, we (1) introduce digital signature trends matching the new demands of the security of network communication; (2) discuss the applications of security electronic authentication center in electronic commerce.In the second part, we (3) explicit present the definition, class, properties, design principles and potential flaws of the security protocols; (4)analye possible attacks suffered by IKE protocol based on the in-depth analysis of its operational principle; (5)summarize the current states of security protocols formal analysis; (6)put forward its classes, and analyze existent new problems.In the third part, we (7) compare and analyze the characters of several logic systems, discuss the relationships among them; (8) present an extension of Cs logic which reflects the properties of timed-release public key protocols better, and give a good formal analysis to a concrete timed-release pubic key protocol; (9) analyze a non-repudiation protocol by using SVO logic , and modify some flaws of the protocol; (10) class the current methods based attack structural; (11) present a model checking algorithm used in security protocols formal analysis;(12)discuss the advantages and disadvantages of model checking technology and theory generation technology, and give a specification of the new mixed technology of the two technologies which can provide a more complete formal analysis of security protocols;(13)give an overview of invariant in different systems;(14)analyze the relationships among them, develop a simple taxonomy; and (IS)discuss some of the implications for future research.
Keywords/Search Tags:cryptographic, digital signature, security protocol, formal analysis, logic system, model checking, invariant generation technology
PDF Full Text Request
Related items