计算机应用 ›› 2005, Vol. 25 ›› Issue (08): 1747-1749.DOI: 10.3724/SP.J.1087.2005.01747

• 网络与信息安全 • 上一篇    下一篇

串空间模型的原理与应用

谭立力1,4,刘璟2,3,谢鸿波3,谭兴烈 4   

  1. 1.卫士通信息产业股份有限公司; 2.现代通信国家重点实验室; 3.电子科技大学计算机科学与工程学院; 4.电子第三十研究所
  • 发布日期:2011-04-07 出版日期:2005-08-01
  • 基金资助:

    现代通信国家重点实验室基金资助项目(51436040305DZ4001);;国家重点基础研究发展规划资助项目(G1999035803)

Theory and application of strand spaces model

TAN Li-li1,4,LIU Jing2,3,XIE Hong-bo3,TAN Xing-lie4   

  1. 1.Westone Information Industry INC,Chengdu Sichuan 610041,China; 2.National Key Laboratory for Modern Communications,Chengdu Sichuan 610041,China; 3.School of Computer Scicence and Engineering,University of Electronic Science and Technology of China,Chengdu Sichuan 610054,China; 4.No.30th Institute of CETC,Chengdu Sichuan 610041,China
  • Online:2011-04-07 Published:2005-08-01

摘要: 介绍了安全协议形式化分析方法串空间模型的基本概念,给出了检查消息机密性的定理的变形公式,形式化地证明了由未泄漏私钥签字的消息起源于诚实主体串,并利用上述结论检验了BAN修改后的CCITTX.509(3)协议的机密性和认证性。

关键词: 密码协议, 串空间, CCITTX.509协议

Abstract: The basic notion of strand spaces model was introduced, then a equivalence formula checking secrecy of messages was given, and it was proven that a signed message by a confidential private key had its origin in a honest strand. Finally these two conclusions were used to check BAN modified version of CCITT X.509(3) protocol.

Key words: cryptographic protocol, strand spaces, CCITT X.509 protocol

中图分类号: