Password protocol safety detection method based on novelty verification condition

A cryptographic protocol and verification condition technology, applied in the field of cryptographic protocol security detection based on freshness verification conditions, can solve the problem of not increasing or decreasing protocol security, and achieve the effect of preventing replay and obfuscation attacks

Inactive Publication Date: 2012-01-04
SHANGHAI JIAOTONG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the model checking method requires a detailed description of the multi-protocol operating environment and the attacker's capabilities, and there are also problems in describing the protocol as a finite state system without increasing or reducing the security of the protocol.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password protocol safety detection method based on novelty verification condition
  • Password protocol safety detection method based on novelty verification condition
  • Password protocol safety detection method based on novelty verification condition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Below in conjunction with accompanying drawing, the embodiment of the present invention is described in detail: present embodiment implements under the premise of technical solution of the present invention, has provided detailed implementation and specific operation process, but protection scope of the present invention is not limited to following Example.

[0050] "Using Encryption for Authentication in Large Network of Computers" published by R.M.Needham et al. in "Communication of the ACM" (ACM Communication) (1978, Vol. The Needham-Schroeder public key authentication cryptographic protocol (hereinafter referred to as the N-S protocol) is proposed in the use of encryption for authentication), and the N-S protocol is the basis of a large number of industrial application authentication key agreements. The N-S protocol is taken as an example to illustrate a security detection method of a cryptographic protocol based on a freshness verification condition in the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a code protocol security detecting method based on freshness verification conditions in the field of information security, which comprises the steps that: inputting the initial value of a code protocol security detecting result, generating a new fact after a communication agent sends or receives each message, obtaining a new security detecting result through operating thefreshness verification condition of a confidence multi-collection method based on the new fact and the built security detecting result until to process the protocol information, obtaining the security conclusion of the code protocol through the code protocol security detecting result, or displaying that the code protocol is safe, or leading out an attack structure for the code protocol with security hidden dangers. The detecting method not only can effectively differentiate whether the message is fresh, but also substantially prevents the attacks of replaying and confusing, and is not relatedto the specific descriptions of a multi-protocol operation environment and the ability of an attacker. In addition, the invention not only is a method of proving the code protocol correctness, but also is a method of searching protocol errors.

Description

technical field [0001] The invention relates to a method in the technical field of information security, in particular to a method for detecting the security of a cryptographic protocol based on a freshness verification condition. Background technique [0002] Cryptographic protocols, also known as security protocols, are interactive communication protocols based on cryptographic systems, providing confidentiality, authentication, integrity, and non-repudiation for various information transmitted in an open network environment. Authenticated key agreement is a cryptographic protocol aimed at the authentication of subject identity and the establishment of session key, and is the basis of other secure communication protocols. For the detection of cryptographic protocol security, the most widely used and effective method is the cryptographic protocol security detection method based on verification conditions. [0003] The cryptographic protocol security detection method based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30
Inventor 陈克非董玲
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products