Security protocol analysis method and device

A security protocol and analysis method technology, which is applied in the field of security protocol analysis methods and devices, can solve problems such as difficult to realize automatic analysis and authentication attacks without considering the special algebraic properties of the protocol, and achieve automatic analysis, enhanced message processing capabilities, The effect of increasing the probability of analysis

Inactive Publication Date: 2011-09-21
THE PLA INFORMATION ENG UNIV
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) The attack of the security protocol may occur on the algebraic properties of some cryptographic primitives. For example, when the NSL protocol does not consider the algebraic properties, the analysis result of the NSL protocol is safe, but after the algebraic properties are introduced, the attacker I can use the encryption operation Under the EBC or CBC system, the nature of the associative law is satisfied, and authentication attacks are generated
[0005] At present, most of the domestic security protocol formal models and their automated analysis tools do not consider the special algebraic properties of the protocol, which may lead to the omission of potential attack instances
Some models only conduct theoretical analysis for individual special algebraic properties, usually with strong restrictions, and the search for the attacker's knowledge set basically uses the enumeration method, which is difficult to achieve automatic analysis
[0006] Through the research on the prior art, the inventor found that: most of the domestic security protocol analysis methods do not consider the special algebraic properties of the agreement, so that it may lead to the omission of potential attack instances generated by the algebraic properties of the cryptographic operators, so the success The probability of analysis is not high; some models only analyze some special algebraic properties, usually focusing on a few operation symbols such as XOR and multiplication, and may miss some hidden attacks, so the probability of successful analysis is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protocol analysis method and device
  • Security protocol analysis method and device
  • Security protocol analysis method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] see figure 1 , figure 1 It is a flowchart of a security protocol analysis method according to an embodiment of the present application. The security protocol analysis method may be the following steps:

[0055] S110: Initialize the pre-obtained low-level description language of the security protocol to obtain the initial state of the security protocol, the state transition rule set, the attacker's initial knowledge set, and the security goal of the security protocol.

[0056] In this step, the low-level description language is used as the input of the security protocol analysis layer, and the low-level description language is initialized and preprocessed to obtain the initial state, the state transition rule set, and the attacker's initial knowledge of the security protocol concurrent system executed in parallel by multiple sessions Security goals for sets and security protocols.

[0057] At the same time of initialization, apply the merging method to the initializat...

Embodiment 2

[0070] This embodiment will introduce the specific steps and flow of the attacker knowledge analysis algorithm in the first method embodiment. First analyze the existence of the attacker's knowledge analysis algorithm:

[0071] According to the characteristics of the equation set E applied in the analysis of most of the existing security protocols, the equation set E can be divided into two categories, one is the equivalence class induced by a limited number of elements. A collection of formulas, such as x 1 ⊕x 2 ≈x 2 ⊕x 1 ,(x 1 ⊕x 2 )⊕x 3 ≈x 1 ⊕(x 2 ⊕x 3 ) and so on, the set of these equations is called a finite set of equations, and the equivalence theory induced by it is called EF theory; one is a set of equations whose induced rewriting relationship can make the depth of terms smaller ,Such as exp ( exp ( x 1 , x ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protocol analysis method and a security protocol analysis device. The security protocol analysis method mainly comprises the following steps of: initializing a security protocol, generating a subsequent state by adopting a subsequent generation algorithm, judging whether the subsequent state is an insecure state, giving a path from an initial state to the subsequent state if the subsequent state is the insecure state, and finishing a flow if the subsequent state is not the insecure state, wherein an attacker knowledge analysis algorithm introducing special algebraic properties is called by the subsequent generation algorithm for attacker deduction problems. In the security protocol analysis method provided by the invention, the processing of the algebraic properties of password operators is added, and the message processing capability of DY attackers, so attacks caused by the algebraic properties can be detected; and the method is applied to most of current security protocol analysis in which password primitives with the special algebraic properties are used, and the success rate of the analysis is greatly increased.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a security protocol analysis method and device. Background technique [0002] With the widespread application of computer networks in many fields such as politics, economy, and military affairs, the security of information in computer networks has become a crucial issue. The security protocol is based on cryptographic algorithms and establishes a secure information transmission channel for all parties involved in secure communication. It can achieve key distribution, identity and message authentication, behavior non-repudiation, and secure electronic transactions. However, due to the openness of the computer network itself, there are various serious security threats in the network. Attackers can conduct various attacks on the security protocol through interception, insertion, tampering, forgery, counterfeiting, etc., and destroy the security goal of the securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04K1/00
Inventor 刘楠祝跃飞颜学雄康绯陈晨马亚南
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products