Title :
Intensive Model Used in Secure Protocol Analysis
Author :
Yang Jie ; Min Hua-Qing ; Qi De-Yu
Author_Institution :
Sch. of Software, South China Univ. of Technol., Guangzhou, China
Abstract :
Strand space inherits the merit of algebra method, which can prove the security of protocol more precisely. Meanwhile, it overcomes the shortcoming of inconvenience. But because of shortage of primitives, it can´t describe some protocols as IKE, let alone verification. This paper makes an improvement to the original strand space by adding the description of hash function and some definitions and lemmas about the description. So we can use the intensive model to analyze the protocols using hash function. At last, we analyze one IKE sub-protocol protocol.
Keywords :
Internet; cryptographic protocols; telecommunication security; IKE sub-protocol protocol; algebra method; hash function; intensive model; lemmas; secure protocol analysis; strand space; Algebra; Cryptography; Protocols; Security; Space technology;
Conference_Titel :
Management and Service Science, 2009. MASS '09. International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-4638-4
Electronic_ISBN :
978-1-4244-4639-1
DOI :
10.1109/ICMSS.2009.5304486