Font Size: a A A

Research On Formal Analysis And Design Of Public Key Protocols

Posted on:2005-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:B WangFull Text:PDF
GTID:2168360152965021Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Today we have seen more and more public key protocols use in networked and distributed systems, so we must select an secure public key protocol otherwise it will jeopardy the secrecy of networks. In secure networked systems, it is essential that principals could prove their identities to each other and establish a session key.Authentication protocols are used to ensure authentication and related purposes,but the design of authentication protocols and how to design the correct protocol in various environments,there are various methods that have been proposed and applied to the analysis of cryptographic protocol. Among those methods,the best known and most influential one is that developed by Burows, Abadi, Needham, commonly known as BAN -logic and BAN-like Logic. This is due to its simplicity and efficiency. But this method is useless when it analysis public key protocols.This paper studies pulic key protocols from the point of view of designing and analyzing. My main works are listed as follow:1. This paper devised a new model of entity authentication and key authentication to analyse the security of the public key cryptographic protocols with regard to their model and protocol goal structures;2. A new model of classification method that based on the prototypes of the public-key authentication protocols,the prototypes abstracted from the protocols.Then give out a design method which based on the classification method for public key protocols;3. This paper through analysed the prototype of Diffle-Hellman key agreement protocol and then gain a new prototype which can provided forward secrecy and can apply to any asymmetric cryptosystem. The new prototype use of the one-way founction and asymmetric cryptosystem;4. Given A countermeasure against Denial-of-Service Attacks in cryptographic authentication protocols,and then this paper designed a strong identity authentication protocols,and we used the analyse method proved previously draw the conclusion that it is a secure protocol.
Keywords/Search Tags:Public Key Protocols, Formal Methods, BAN-like Logic, Strong Authentication Protocol, Forward Secrecy, Prototypes, DoS Attack
PDF Full Text Request
Related items