Font Size: a A A

Research On Security Protocol Composition Design Strategy

Posted on:2020-09-26Degree:MasterType:Thesis
Country:ChinaCandidate:R Q Q LinFull Text:PDF
GTID:2428330590458353Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
Designing a security protocol is one of the most complex and error-prone proces-ses in building a security system.Manually designing a security protocol is difficult and has a high error rate,while requiring a high degree of professionalism.The purpose of this study is to use a combined approach that is simple and efficient.Design security protocols,similar to modular development software,independently design each sub-protocol,and strictly select security mechanisms to accumulate the security attributes required by the system,including authentication,confidentiality and non-repudiation,etc.Finally,the composite solution is generated to meet the demand.Security Protocol.Aiming at the shortcomings of the current security protocol automatic design scheme,such as abstraction and low practicality,this paper proposes a combination design mechanism based on protocol primitives,and verifies their security and correctness.These protocol primitives are based on immune genetic algorithms combined with line calculus.Due to the high computational efficiency and intelligence of immune genetic algorithms,it is very efficient for generating simple protocols that satisfy a single security attribute,and line calculus can guarantee the original protocol.Language achieves safety goals and is easy to prove.By applying a combination rule to the protocol primitives,a complex protocol can be built using simple protocol primitives,ie,a combined design.This design strategy allows a number of simple protocol parts to be combined into a complex security protocol without breaking the security attributes established by each individual sub-protocol.In other words,the combinatorial framework can decompose the specification of the complex protocol into a simpler sub-protocol specification,which makes the design and verification of the protocol easier,and adopts operations such as improving optimization and deformation to further improve the efficiency of the protocol and make the generated protocol.While the required security attributes are met and the performance is good.
Keywords/Search Tags:Security Protocol, Composition Design, Immune Genetic Algorithm, Cord Calculus
PDF Full Text Request
Related items