DocumentCode :
2165913
Title :
Intensive Model Used in Secure Protocol Analysis
Author :
Yang Jie ; Min Hua-Qing ; Qi De-Yu
Author_Institution :
Sch. of Software, South China Univ. of Technol., Guangzhou, China
fYear :
2009
fDate :
20-22 Sept. 2009
Firstpage :
1
Lastpage :
4
Abstract :
Strand space inherits the merit of algebra method, which can prove the security of protocol more precisely. Meanwhile, it overcomes the shortcoming of inconvenience. But because of shortage of primitives, it can´t describe some protocols as IKE, let alone verification. This paper makes an improvement to the original strand space by adding the description of hash function and some definitions and lemmas about the description. So we can use the intensive model to analyze the protocols using hash function. At last, we analyze one IKE sub-protocol protocol.
Keywords :
Internet; cryptographic protocols; telecommunication security; IKE sub-protocol protocol; algebra method; hash function; intensive model; lemmas; secure protocol analysis; strand space; Algebra; Cryptography; Protocols; Security; Space technology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Management and Service Science, 2009. MASS '09. International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-4638-4
Electronic_ISBN :
978-1-4244-4639-1
Type :
conf
DOI :
10.1109/ICMSS.2009.5304486
Filename :
5304486
Link To Document :
بازگشت