- 1、本文档共20页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR-英文文献
Breaking and Fixing the
NeedhamSchro eder
PublicKey Proto col using
FDR
Gavin Lowe
ABSTRACT In this pap er we analyse the well known NeedhamSchro eder
PublicKey Proto col using FDR a renement checker for CSP We use
FDR to discover an attack up on the proto col which allows an intruder to
imp ersonate another agent We adapt the proto col and then use FDR to
show that the new proto col is secure at least for a small system Finally
we prove a result which tells us that if this small system is secure then so
is a system of arbitrary size
Intro duction
In a distributed computer system it is necessary to have some mechanism
whereby a pair of agents can b e assured of each others identitythey
should b ecome sure that they really are talking to each other rather than
to an intruder imp ersonating the other agent This is the role of an authen
tication pr otocol
In this pap er we use the Failures Divergences Renement Checker FDR
a mo del checker for CSP to analyse the NeedhamSchro eder Public
Key Authentication Proto col FDR takes as input two CSP pro cesses a
sp ecication and an implementation and tests whether the implementation
renes the sp ecication It has b een used to analyse many sorts of sys
tems including communications proto cols distributed databases
and puzzles we show here how it may b e used to analyse security proto cols
We mo del the agents taking part in the proto col as CSP pro cesses We
also mo del the most general intruder who can interact with the proto col
the intruder can observe and intercept messages and so learn information
such as the values of noncesand then use this information to intro duce
fake messages into the system We use FDR to test whether the proto col
correct
您可能关注的文档
- Adaptive Protocols for Information Dissemination in Wireless Sensor Networks-英文文献.pdf
- Alternative isoform regulation in human tissue transcriptomes-英文文献.pdf
- An Architecture for Wide-Area Multicast Routing-英文文献.pdf
- An argument for basic emotions-英文文献.pdf
- An Efficient Routing Protocol for Wireless Networks-英文文献.pdf
- An Empirical Study of Smoothing Techniques for Language Modeling-英文文献.pdf
- An Empirical Characterization of the Dynamic Effects of changes in Government Spending and Taxes on Output-英文文献.pdf
- An Energy-Efficient MAC Protocol for Wireless Sensor Networks-英文文献.pdf
- An approach to correlate tandem mass spectral data of peptides with amino acid sequences in a protein database-英文文献.pdf
- An Algorithm for Tracking Multiple Targets-英文文献.pdf
- Bid, ask and transaction prices in a specialist market with heterogeneously informed traders-英文文献.pdf
- Calibrated geometries-英文文献.pdf
- Calibrating noise to sensitivity in private data analysis-英文文献.pdf
- Capacity of Fading Channels with Channel Side Information-英文文献.pdf
- Capacity of multi-antenna Gaussian channels-英文文献.pdf
- Centrality in social networks conceptual clarification-英文文献.pdf
- Characteristics of a human cell line transformed by DNA from human adenovirus type 5-英文文献.pdf
- Classification in the KL-ONE knowledge representation system-英文文献.pdf
- Cluster Ensembles - A Knowledge Reuse Framework for Combining Multiple Partitions-英文文献.pdf
- Cognitive networks-英文文献.pdf
文档评论(0)