重囗另类BBWSeⅹHD,av狼论坛,精品一卡2卡三卡4卡乱码理论,体育生gv老师浪小辉3p警察

Cryptographic protocol security anal

時間:2023-04-29 22:30:20 數理化學論文 我要投稿
  • 相關推薦

Cryptographic protocol security analysis based on bounded constructing algorithm

An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

作 者: LI Xianxian HUAI Jinpeng   作者單位: School of Computer, Beihang University, Beijing 100083, China  刊 名: 中國科學F輯(英文版)  SCI 英文刊名: SCIENCE IN CHINA SERIES F:INFORMATION SCIENCES  年,卷(期): 2006 49(1)  分類號: O1  關鍵詞: cryptographic protocol   formal analysis   security verification  

【Cryptographic protocol security anal】相關文章:

Collective security:集體安全05-04

主站蜘蛛池模板: 谢通门县| 扬州市| 梁平县| 古丈县| 临江市| 常州市| 金乡县| 米易县| 隆子县| 南靖县| 无棣县| 婺源县| 商城县| 云霄县| 闻喜县| 阿克陶县| 溧阳市| 芮城县| 息烽县| 营山县| 老河口市| 定安县| 玉山县| 航空| 洛扎县| 修文县| 苏尼特右旗| 岱山县| 蓬溪县| 安吉县| 巴林左旗| 山阴县| 习水县| 洮南市| 象州县| 公安县| 沛县| 冷水江市| 女性| 定结县| 济阳县|