Font Size: a A A

Flaw Analysis Of Security Protocol And Automatic Tool

Posted on:2008-10-31Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhouFull Text:PDF
GTID:2178360212476031Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Today, with the rapid development of internet, various network security protocols have been widely in application. The security problems caused by protocol design have been regarded as great significance as well. The complex network environment which leads attackers making use of the flaws of protocol to demolish the world, at the same time brings difficulties in confirmation of security of protocols.Formal methods for protocol analysis ware put forward based on changing the security problem into a mathematical problem, which we can rigorously prove it instead of judging by intuition. It has been generally regarded as a reasonable method and multiform related models have been published.Mainly with a view to flaw detection, some research related to security protocol formal method has been summed up in this dissertation. First there is a summary of protocol blemish, which points out that all security problems can be formally concluded to six kinds of flaws, that is identification flaw, personating attack flaw, confidentiality flaw, freshness flaw, type attack flaw and illegitimate benefit flaw. Whether these six kinds of flaws can be detected...
Keywords/Search Tags:security protocol, flaw, GSPM, automatic checking, tool
PDF Full Text Request
Related items