Password protocol safety detection method based on novelty verification condition

A cryptographic protocol and verification condition technology, applied in the field of cryptographic protocol security detection based on freshness verification conditions, can solve the problem of not increasing or decreasing protocol security, and achieve the effect of preventing replay and obfuscation attacks

Inactive Publication Date: 2009-06-17
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the model checking method requires a detailed description of the multi-protocol operating environment and the attacker's capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password protocol safety detection method based on novelty verification condition
  • Password protocol safety detection method based on novelty verification condition
  • Password protocol safety detection method based on novelty verification condition

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0049] The embodiments of the present invention will be described in detail below with reference to the accompanying drawings: this embodiment is implemented under the premise of the technical solution of the present invention, and detailed implementation and specific operation procedures are given, but the protection scope of the present invention is not limited to the following Examples.

[0050] RMNeedham et al. published "Using Encryption for Authenticationin Large Network of Computers" in "Communication of the ACM" (1978, Vol. 21, No. 12, pp. 993-999). The Needham-Schroeder public key authentication cryptographic protocol (hereinafter referred to as the NS protocol) is proposed in Using encryption for authentication. The NS protocol is the basis of a large number of industrial application authentication key protocols. Take the N-S protocol as an example to illustrate the present invention—a cryptographic protocol security detection method based on freshness verification condi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a code protocol security detecting method based on freshness verification conditions in the field of information security, which comprises the steps that: inputting the initial value of a code protocol security detecting result, generating a new fact after a communication agent sends or receives each message, obtaining a new security detecting result through operating the freshness verification condition of a confidence multi-collection method based on the new fact and the built security detecting result until to process the protocol information, obtaining the security conclusion of the code protocol through the code protocol security detecting result, or displaying that the code protocol is safe, or leading out an attack structure for the code protocol with security hidden dangers. The detecting method not only can effectively differentiate whether the message is fresh, but also substantially prevents the attacks of replaying and confusing, and is not related to the specific descriptions of a multi-protocol operation environment and the ability of an attacker. In addition, the invention not only is a method of proving the code protocol correctness, but also is a method of searching protocol errors.

Description

technical field [0001] The invention relates to a method in the technical field of information security, in particular to a method for detecting the security of a cryptographic protocol based on a freshness verification condition. Background technique [0002] Cryptographic protocols, also known as security protocols, are interactive communication protocols based on cryptographic systems, providing confidentiality, authentication, integrity, and non-repudiation for various information transmitted in an open network environment. Authenticated key agreement is a cryptographic protocol aimed at the authentication of subject identity and the establishment of session key, and is the basis of other secure communication protocols. For the detection of cryptographic protocol security, the most widely used and effective method is the cryptographic protocol security detection method based on verification conditions. [0003] The cryptographic protocol security detection method based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30
Inventor 陈克非董玲
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products