Font Size: a A A

Research On Design And Authentication Of Security Protocols

Posted on:2005-10-28Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2168360152968080Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Security protocol is a very important issue of communication and network security. From the angle of model construction, the current researches can be divided into three categories: logical analysis, formulation induction and state machine search. With the development of network and its requirements, the design of security protocols has become another focus in this area. In the preface, the dissertation covers the development of the research on security protocol authentication and design. And the primary work of present dissertation includes:⑴The discussion of a state machine, Murφ is carried out. Some improves are also given to reduce the expandability of the state number. ⑵The investigation of Debbabi's formulation induction model is planned. By adding some inverse reasoning model, the capability of the model is extended resulting in the solution of generation of unlimited attack sequences. ⑶The type flaw of security protocol is hard to detect. However, by adding some structural reasoning model, the Debbabi's model can solve some of those problems. ⑷A new model of security protocol, layer-based security protocol model is presented. With this model, an efficient security protocol generation system and also an authentication system are designed. ⑸The future issues of security protocols are studied, especially in the most two hot points: Detection of Type Flaw and the security problems remain coexistence of more than one security protocols. A possible solution of these two problems, dynamic protocol and its applications are also carried out in this dissertation.
Keywords/Search Tags:Security protocol, State machine, Formulation induction, Logical analysis, Layer-based model
PDF Full Text Request
Related items