Formal verification method for security protocol

A formal verification and security protocol technology, applied in the field of formal verification of security protocols based on model detection, to achieve the effect of reducing scale, reducing the probability of state explosion, and reducing complexity

Inactive Publication Date: 2011-05-18
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problems existing in model checking in the prior art, the present invention proposes a formal verification method for security protocols that can reduce the complexity of accurate modeling and is not prone to state explosion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Formal verification method for security protocol
  • Formal verification method for security protocol
  • Formal verification method for security protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The method of the present invention will be described in detail below in conjunction with the drawings and specific embodiments.

[0030] Such as figure 1 As shown, under the condition of a given network environment, a security protocol is given, and the flow of the verification method of the present invention includes steps such as protocol layering, target decomposition, hierarchical modeling and description, and layered verification.

[0031] 1) Protocol layering Specific protocols use certain security measures in order to achieve security goals. In actual protocols, it is reflected in the fact that the protocols include certain steps to achieve these security guarantees. Therefore, we can stratify the protocol according to the functions realized by the protocol steps. The layering should ensure that the functions of different layers are relatively independent or that the underlying functions are the basis for the realization of the upper layer functions and try to a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a formal verification method for a security protocol, which comprises the following steps of: 1) giving the security protocol under a set network environment; 2) layering the security protocol according to functions realized by an execution step of the security protocol; 3) decomposing an expected security goal into subgoals corresponding to sublayers; 4) modeling each sublayer in turn and describing each subgoal; and 5) respectively verifying whether layering models constructed in the step 4) meet the subgoals corresponding to the layering models or not, and if so, finishing the verification of the security protocol. By combining a layering method with a model checking scheme, dividing the security protocol into clearly layered modules and verifying the modules respectively, the complexity of accurate modeling is reduced; and on the premise of not influencing the correctness of a verification result, the scale of a state space in the checking process is greatlyreduced.

Description

technical field [0001] The invention mainly relates to the field of formal verification of security protocols for information security, and exactly provides a formal verification method of security protocols based on model detection. Background technique [0002] With the continuous development of network technology, the interaction of network information is becoming more and more frequent. In order to make network communication more secure and reliable, people have introduced security protocols to ensure the safe and secret interaction of transmitted information. Different application scenarios and application purposes determine that security protocols need to have certain security properties. However, due to the complexity of the network environment, the security properties of security protocols are often difficult to be guaranteed. Therefore, people need an effective way to conduct comprehensive and rigorous analysis and verification of security protocols. Formal verif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 薛锐彭建华刘峰
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products