Font Size: a A A

Research On Interactive Security Protocol Analysis Based-on Uinversal Composable

Posted on:2012-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:Q L QiFull Text:PDF
GTID:2248330374480846Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The security protocol is the important technique that guarantees the security of the network. Inthe information security filed, it is a difficult task to design and analyze the security protocolin the complex network. At present, the technique include mainly: the Based on Modal Logic,the Theorem Proving, the Based on Process Calculus, the Based on Provable SecurityTheorem and the Composed Security Proving. Most of them have limitation because ofConsidering that the security protocols are set in a isolated setting. The composed securityproving method gets over these limitations by analyzing the security protocol in a settingwhere multiplicate protocols coexist. Therefore, this technique is adapted more for the realopen network, and has been the focus in the analysis of security protocol.The origin of the Universal Composable security model is the Security Multi-PartyComputation and the Modular design. Its composed theorems guarantee the securityproperties what there are in an isolated setting are preserved in dynamic complex network.After researching the security proven of the interactive network protocol based on theUniversal Composeble security model in the complex network, the ISPA-UC (InteractiveSecurity Protocol Analysis Based-on UC) was proved as the general method for analyzing thesecurity protocol. Then the partial protocol belonging to the WLAN or IPSec protocol clusterwas analyzed and modified, and was proven that they have universal composeble security inthe provided way. the advanced and UC security3-Way handshake was given aiming at theproblem that the4-Way handshake failed to resist the Denial of Service; the effective and UCsecurity Light Just Fast Key protocol was given aiming at the redundancy of the Just Fast Keyprotocol in the IPsec protocol cluster; the ideal function was defined aiming at the Self-updateHash Chain Authentication protocol, and the hybrid protocol based on the One Time Signedideal function that can UC realize the previous ideal function was designed.Through the proven and optimization aiming at the present WLAN and IPSec protocolusing the ISPA-UC method, the validity of this method for analyzing the security protocolwas validated. Therefore it can be used to instruct the design and the optimization of theinteractive network security protocol.
Keywords/Search Tags:Security Protocol, Universal Compsable, 4-Way Key Exchange, Self-updating Hash Chain
PDF Full Text Request
Related items