Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method for Constructing Security Protocol Messages

A security protocol and construction method technology, applied in the field of information security, can solve the problems of low abstraction accuracy of security protocol specifications, incomplete understanding of security protocol implementation, inaccurate analysis results, etc., to achieve high accuracy, high efficiency and accuracy. rate, accurate results

Active Publication Date: 2019-09-10
SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1) Incomplete and inaccurate understanding of security protocol implementation, leading to inaccurate analysis results;
[0007] 2) The accuracy rate of specification abstraction for the implementation of security protocols is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Constructing Security Protocol Messages
  • A Method for Constructing Security Protocol Messages
  • A Method for Constructing Security Protocol Messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0028] In order to analyze the implementation (protocol deployment code) security of the security protocol deployed in the network application system based on the B / S mode, a method based on message construction is proposed to analyze the implementation security of the security protocol. Here, the message construction means automatically generating a legal security protocol client message, which is sent to the security protocol server. The response message of the server is analyzed later, so as to analyze the security of the security protocol implementation. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient security protocol message generation method. An algorithm of carrying out analysis for a function trace of a security related function obtained through utilizationof a function hooking technology in security protocol implementation is provided, and the function trace is analyzed; a protocol message generation model is provided, and on the basis of a model, thesecurity protocol message generation method is provided. The message generation comprises the steps of positioning protocol message cells needing to be replaced, regenerating hijacked security function output, replacing the protocol message cells needing to be replaced in an original protocol message, and the like. The security protocol implementation security research based on the assumption that security protocol client implementation can be obtained is consistent with current application reality, so the fact that the security protocol message is constructed based on the assumption is alsoconsistent with the current research reality. According to the method, a security protocol message is constructed at a code level, so the technical scheme is feasible and has relatively high accuracyand efficiency.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a method for constructing a security protocol message, in particular to an efficient method for constructing a security protocol message. Background technique [0002] As an important part of cyberspace security, security protocols are the key and soul of cyberspace security. Therefore, analyzing and verifying the security of security protocols running in computer networks, communication networks, and distributed systems, and discovering their logical errors and security loopholes, are crucial to ensuring cyberspace security. [0003] From security protocol design, security analysis and verification of security protocol abstract specification, to security protocol implementation (security protocol code), people mainly focus on security analysis and validation of security protocol abstract specification, which is less practical. In recent years, there has been increasi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 孟博鲁金钿王德军朱容波
Owner SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES