网络安全认证协议形式化分析.ppt
《网络安全认证协议形式化分析.ppt》由会员分享,可在线阅读,更多相关《网络安全认证协议形式化分析.ppt(24页珍藏版)》请在三一办公上搜索。
1、网络安全认证协议形式化分析,肖 美 华南昌大学信息工程学院(南昌,330029)中国科学院软件研究所计算机科学重点实验室(北京,100080),2023/6/23,第二十次全国计算机安全学术交流会,2,Organization,IntroductionRelated WorkFormal System NotationIntruders Algorithmic Knowledge LogicVerification Using SPIN/PromelaConclusion,2023/6/23,第二十次全国计算机安全学术交流会,3,Introduction,Cryptographic proto
2、cols are protocols that use cryptography to distribute keys and authenticate principals and data over a network.Formal methods,a combination of a mathematical or logical model of a system and its requirements,together with an effective procedure for determining whether a proof that a system satisfie
3、s its requirements is correct.Model;Requirement(Specification);Verification.,2023/6/23,第二十次全国计算机安全学术交流会,4,Introduction(cont.),In cryptographic protocols,it is very crucial to ensure:Messages meant for a principal cannot be read/accessed by others(secrecy);Guarantee genuineness of the sender of the m
4、essage(authenticity);Integrity;Non-Repudiation(NRO,NRR);Fairness,etc.,2023/6/23,第二十次全国计算机安全学术交流会,5,Related Work,Techniques of verifying security properties of the cryptographic protocols can be broadly categorized:methods based on belief logics(BAN Logic)-calculus based models state machine models(M
5、odel Checking)Model checking advantages(compare with theory proving):automatic;counterexample if violation Use LTL(Linear temporal logic)to specify properties FDR(Lowe);Mur(Mitchell);Interrogator(Millen);Brutus(Marrero)SPIN(Hollzmann)theorem prover based methods(NRL,Meadows)methods based on state ma
6、chine model and theorem prover(Athena,Dawn)Type checkingISCAS,LOIS,(in China),2023/6/23,第二十次全国计算机安全学术交流会,6,Notation,(1)Messages a Atom:=C|N|k|m Msg:=a|m m|mk(2)Contain Relationship()m a m=a m m1 m2 m=m1 m2 m m1 m m2 m m1k m=m1k m m1 Submessage:sub-msgs(m)m Msg|m m,2023/6/23,第二十次全国计算机安全学术交流会,7,Notati
7、on,(3)Derivation(,Dolev-Yao model)m B B m B m B m B m m(pairing)B m m B m B m(projection)B m B k B mk(encryption)B mk B k-1 B m(decryption),2023/6/23,第二十次全国计算机安全学术交流会,8,Notation,(4)Properties Lemma 1.B m B B B m Lemma 2.B m B m m B m Lemma 3.B m X m B X(Y:Y sub-msgs(m):X Y B Y)(b:b B:Y b)(Z,k:Z Msg
8、k Key:Y=Zk B k-1)Lemma 4.(k,b:k Key b B:k b A k AB k)(z:z sub-msgs(x):a z A z)(b:b B:a b A a),2023/6/23,第二十次全国计算机安全学术交流会,9,Logic of Algorithmic Knowledge,Definition 1.Primitive propositions P0s for security:p,q P0s:=sendi(m)Principal i sent message m recvi(m)Principal i received message m hasi(m)Pri
9、ncipal i has message m,2023/6/23,第二十次全国计算机安全学术交流会,10,Logic of Algorithmic Knowledge,Definition 2.An interpreted security system S=(R,R),where R is a system for security protocols,and R is the following interpretation of the primitive propositions in R.R(r,m)(sendi(m)=true iff j such that send(j,m)ri
10、(m)R(r,m)(recvi(m)=true iff recv(m)ri(m)R(r,m)(hasi(m)=true iff m such that m m and recv(m)ri(m),2023/6/23,第二十次全国计算机安全学术交流会,11,Logic of Algorithmic Knowledge,Definition 3.An interpreted algorithmic security system(R,R,A1,A2,An),where R is a security system,and R is the interpretation in R,Ai is a kn
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络安全 认证 协议 形式化 分析

链接地址:https://www.31ppt.com/p-5300984.html