Font Size: a A A

Formal Describing And Validating Of Network Security Protocols

Posted on:2005-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:X M DaiFull Text:PDF
GTID:2168360152465428Subject:Computer technology
Abstract/Summary:PDF Full Text Request
It is the focus of research to design and analyze security protocols of the Internet, currently. Authentication protocols and electronic commerce protocols are key tache in electronic commerce , the research in those and their security is very important for promoting the development of electronic commerce.The main works are as follows in this paper:(1)This paper introduce the status of the reseach in cryptographic protocols , electronic commerce protocols and formal analysis method.(2)In this paper ,we analyze some popular authentication protocols in the world now,such as Needham-Schroeder, Otway-Rees and Kerberos.The designing principles of electronic commerce protocols are introduced,such as Anonymity, Non-Reputation, Fairness and so on.The payment protocols for elcectronic commerce are introduced too.The principles of design and analysis for cryptographic protocols are dicussed in it.(3) In this paper, two kinds of logic languages used in analyzing cryptographic protocols are primarily introduced , and studied in their advantages and weakness.(4) The security protocols that based on PKI ,the x.509 and the LDAP are also introduced too.(5) The authentication protocols are provided for the System of the bussness for the management Bureau of adminstration for Industry and commerce, and the writer use the formal method to describe them. (6) The writer try to using the formal logic languages to validate the protocols and improving them and perfect them. The writer describe the applications of authentication protocols in the System of the bussness for the management Bureau of adminstration for Industry and commerce. Final,the author successfully applies these perfect protocols to the software production (network Examination flatform based on information security).
Keywords/Search Tags:electronic commerce protocol, authentication protocol, formal analysis
PDF Full Text Request
Related items