Method for establishing cipher protocol security based on trustful greenness

A cryptographic protocol and freshness technology, applied in the field of information security, can solve problems such as unconvincing security, inability to determine whether the protocol is correct enough and necessary, and inability to effectively determine whether a message is fresh, etc., to prevent replay and the effect of the obfuscated attack

Inactive Publication Date: 2008-11-05
SHANGHAI JIAO TONG UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although researchers have proposed many strict security verification methods for the verification of cryptographic protocol security, and have achieved remarkable results, there are still many important issues that have not been satisfactorily resolved: (1). Whether the message is fresh, so that replay and confusion attacks cannot be prevented, is related to the specific formal description of the multi-protocol operating environment and the attacker's capabilities
(2). No specific quantitative indicators are given to ensure that the cryptographic protocol has sufficient security, so that it is impossible to give a sufficient and necessary judgment on the correctness of the protocol
Therefore, although BAN-like logic is very successful in revealing the implicit assumptions missed by the protocol, its inference rules cannot effectively distinguish whether the message is fresh or not, which is related to the specific formal description of the multi-protocol operating environment and the attacker's capabilities. , and cannot detect interleaving attacks and replay attacks
In addition, because the idealization process of the protocol in the BAN class logic is non-standard, the specific quantitative indicators given to ensure that the cryptographic protocol has sufficient security cannot give both sufficient and necessary judgments on the correctness of the protocol. Therefore, the BAN class A protocol that is logically proven secure, but not convincingly secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing cipher protocol security based on trustful greenness
  • Method for establishing cipher protocol security based on trustful greenness
  • Method for establishing cipher protocol security based on trustful greenness

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Below in conjunction with accompanying drawing, the embodiment of the present invention is described in detail: present embodiment implements under the premise of technical solution of the present invention, has provided detailed implementation and specific operation process, but protection scope of the present invention is not limited to following Example.

[0053] "The SSL Protocol Version 3.0" (SSL protocol version 3.0) published by Alan O. Freier et al. on the URL address http: / / wp.netscape.com / eng / ssl3 / draft302.txt is an asymmetric public protocol designed by Netscape. A key transfer protocol for key cryptography. K ab is a temporary session key randomly selected by subject A for the session between A and B, and CA is the public key certificate of subject A. The transmission of messages related to authentication in the SSL protocol is as follows:

[0054] Message 1 A→B: {K ab} Kb

[0055] Message 2 B→A: {N b}K ab

[0056] Message 3 A→B: {CA, {N b}K a -1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for building the cryptographic protocol security based on the novelty in the information safety domain, including: determining the safe target of the cryptographic protocol to be concluded; determining the initial hypothesis of the cryptographic protocol security validation; building the cryptographic protocol security attribute obtained by the communication participating main body based on the initial hypothesis and the novelty principle of the cryptographic protocol security after transmitting or receiving each information, till the end of the protocol operation; comparing the obtained cryptographic protocol security attribute with the expected safe target. The invention effectively differentiates whether the information is novel, prevents the attack of the playback and confusion essentially, independent of the security validation and the intercurrent operating environment and the specific formalization description of the attacker's ability, which is of great efficiency to the validation cryptographic protocol, further to be expanded, applied to a plurality of validation of the cryptographic protocol security attribute.

Description

technical field [0001] The present invention relates to a method in the technical field of information security, in particular to a method for establishing cryptographic protocol security based on the freshness of trust. Background technique [0002] Cryptographic protocols, also known as security protocols, are interactive communication protocols based on cryptographic systems, providing confidentiality, authentication, integrity, and non-repudiation for various information transmitted in an open network environment. The security goals of cryptographic protocols are varied. The authentication protocol is a cryptographic protocol aimed at the authentication of the subject's identity or the establishment of a session key, and is the basis of other secure communication protocols. But the existing cryptographic protocols are often proved to be not as secure as their designers expected, and it is a very difficult task to design and verify a correct cryptographic protocol. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 陈克非董玲
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products