- 1、本文档共20页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR-英文文献
Breaking and Fixing the
NeedhamSchro eder
PublicKey Proto col using
FDR
Gavin Lowe
ABSTRACT In this pap er we analyse the well known NeedhamSchro eder
PublicKey Proto col using FDR a renement checker for CSP We use
FDR to discover an attack up on the proto col which allows an intruder to
imp ersonate another agent We adapt the proto col and then use FDR to
show that the new proto col is secure at least for a small system Finally
we prove a result which tells us that if this small system is secure then so
is a system of arbitrary size
Intro duction
In a distributed computer system it is necessary to have some mechanism
whereby a pair of agents can b e assured of each others identitythey
should b ecome sure that they really are talking to each other rather than
to an intruder imp ersonating the other agent This is the role of an authen
tication pr otocol
In this pap er we use the Failures Divergences Renement Checker FDR
a mo del checker for CSP to analyse the NeedhamSchro eder Public
Key Authentication Proto col FDR takes as input two CSP pro cesses a
sp ecication and an implementation and tests whether the implementation
renes the sp ecication It has b een used to analyse many sorts of sys
tems including communications proto cols distributed databases
and puzzles we show here how it may b e used to analyse security proto cols
We mo del the agents taking part in the proto col as CSP pro cesses We
also mo del the most general intruder who can interact with the proto col
the intruder can observe and intercept messages and so learn information
such as the values of noncesand then use this information to intro duce
fake messages into the system We use FDR to test whether the proto col
correct
您可能关注的文档
- Adaptive Protocols for Information Dissemination in Wireless Sensor Networks-英文文献.pdf
- Alternative isoform regulation in human tissue transcriptomes-英文文献.pdf
- An Architecture for Wide-Area Multicast Routing-英文文献.pdf
- An argument for basic emotions-英文文献.pdf
- An Efficient Routing Protocol for Wireless Networks-英文文献.pdf
- An Efficient Boosting Algorithm for Combining Preferences-英文文献.pdf
- An Empirical Study of Smoothing Techniques for Language Modeling-英文文献.pdf
- An Empirical Characterization of the Dynamic Effects of changes in Government Spending and Taxes on Output-英文文献.pdf
- An Energy-Efficient MAC Protocol for Wireless Sensor Networks-英文文献.pdf
- An approach to correlate tandem mass spectral data of peptides with amino acid sequences in a protein database-英文文献.pdf
- 个人承诺书 15篇完整版 .pdf
- 部编版道德与法治三年级下册《1我是独特的》(省一等奖优质课)教案.pdf
- 部编人教版四年级语文下册.第六单元《乡村生活》作文范文 .pdf
- 数控技术应用专业(中职)人才培养方案 .pdf
- 2023年4月陕西咸阳市2023届高三三模英语试题卷(含答案word精校版).pdf
- 2024年高考语文作文热点预测+满分范文 .pdf
- 2023武汉市硚口区事业单位考试历年真题 .pdf
- 北京市朝阳区2013年事业单位《公共基本能力测验》(缺单选16-45题,72.pdf
- 社区社会工作基础知识试题(含答案)vr .pdf
- 2021康复医学治疗技术(士)模拟试题及答案5篇 .pdf
文档评论(0)