Font Size: a A A

Logical Methods Of Improvement And A Number Of Cryptographic Protocols, Security Analysis

Posted on:2006-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y F YuanFull Text:PDF
GTID:2208360182960385Subject:Cryptography
Abstract/Summary:PDF Full Text Request
This paper is propose a new BAN-like logic system on the Li-logic. We add new symbol,new formula,axiom about message source, axiom about message generation,axiom about the identity of participator, axiom about message receipt,and give some usual theorem. In this paper.we solve the problem how to prove the random numbers are double retroactive in some cryptographic protocols on public-key cryptosystem. Based on the new authentication logic system, we prove the security of NSL protocol ,and the random numbers are double retroactive. And we analyze the authentication and key agreement protocol of 3G mobile communication.and find their security deficiency. We propose the improvement of protocol which achieve authentication of MS to VLR and protect the IMSI and MS join the key agreement.
Keywords/Search Tags:BAN-like logic, cryptographic protocol, formal analysis
PDF Full Text Request
Related items