检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]广西财经学院实验教学中心,广西南宁530003 [2]中国移动通信集团广西分公司,广西南宁530022
出 处:《计算机工程与设计》2014年第4期1207-1213,共7页Computer Engineering and Design
基 金:广西高等学校科学技术研究基金项目(2013YB215);广西财经学院科研基金项目(2013B047);广西财经学院实验教学中心经济与管理实验教学示范中心实验开发基金项目(2013syzxxm07)
摘 要:为提高复合协议设计的效率和降低组合设计过程的复杂度,构建了一种基于原语自动生成的安全协议组合设计新策略。利用自动生成工具高效地设计满足安全需求的正确原语;根据新的可组合元素附加规则,修改消息项结构,添加可组合元素,使原语具备可组合性,降低后续组合设计过程的复杂度;根据新的组合设计规则,从可组合的简单原语出发构建复合协议。进行了应用研究,分别设计出了非对称密钥体制下双向认证协议和对称密钥体制下带有可信第三方的双向认证且密钥建立协议。实践分析结果表明,该策略同时具备自动设计正确高效以及组合设计简便易行的优点,是一种较为可行的、适用于复杂安全协议设计的新策略。For higher efficiency and lower complexity in composition design of complex protocol, a new strategy based on primi- tive automatic generation is constructed. Firstly, primitives meeting certain security requirements are generated by automation tool with verification for correctness. Secondly, according to new addition rules for compositional dements, modifications of mes- sage term structure are carried out. This step ensures composability of primitives and reduction of complexity in subsequent de- sign process. At last, complex protocol can be constructed and verified from simple primitives with new composition rules. In ap- plication of security protocol design, two-party mutual authentication protocol in symmetric key cryptography and two-party mu- tual authentication with trusted third party and key establishment protocol in asymmetric key cryptography are designed. It is proved that the strategy possesses advantages of high efficiency in primitive generation, effectiveness in composability construc- tion, and rationality in composition design, providing a new and simple way for composition design of complex security protocol.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.166