Font Size: a A A

Philosophical Implication In Logical Methods On Analyzing The Security Of Cryptographic Protocols

Posted on:2016-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:H Q ChengFull Text:PDF
GTID:2308330461472775Subject:Philosophy of science and technology
Abstract/Summary:PDF Full Text Request
The rise of the Internet promotes the development of our society. Network Information security issues become inevitable important problems when we take advantage of the Internet for convenience and they become threats and challenges to our social mechanism and daily life. However, cryptographic protocols are the main solutions even are the core approaches which aim at solving Network Information security issues. So it becomes more and more important to do the analysis work about the security of cryptographic protocols.There are two main approaches about analyzing the security of cryptographic protocols. One way is based on the theory of cryptography, the other way is based on formal methods. Logical methods are a kind of representative methods of formal methods. These two methods all have advantages and disadvantages. Generally speaking, the analysis conclusion by using methods based on the theory of cryptography has the advantage that it has high credibility, but the inadequacy is that it needs more technical work and it relies on personal ability more. The biggest advantage of logical methods is that its analytic process is direct and concise. The advantages of logical methods are exactly the main goal we are pursuing in today’s rapidly developing society if we can guarantee that the analysis conclusion by using logical method has enough credibility.However, the analysis above is mainly made at the technical level and there is little deeper and more systematic research on methodology and philosophical foundation it involves. This paper tries to analyze and reason the advantages and deficiencies of logical methods of analyzing the security of cryptographic protocols comprehensively beyond the technical level by comparing with the process of using methods of the theory of cryptography to analyze the protocols and relying on many results we have achieved.
Keywords/Search Tags:cryptographic protocol, logical methods, computation, credibility
PDF Full Text Request
Related items