Safety protocol formal verification method based on model detection

A formal verification and security protocol technology, applied in the field of formal verification of security protocols based on model checking, to reduce complexity, alleviate the problem of state explosion, and reduce scale

Inactive Publication Date: 2019-01-04
EAST CHINA JIAOTONG UNIVERSITY
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problems existing in the current model detection technology, the present invention proposes a formal verification metho

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protocol formal verification method based on model detection
  • Safety protocol formal verification method based on model detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] The method of the present invention will be described in detail below with reference to the drawings and specific embodiments.

[0042] Such as figure 1 and figure 2 As shown, for a specific given security protocol, the process flow of the verification method of the present invention includes four steps: protocol modeling, security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety protocol formal verification method based on model detection. In the method, an intruder model based on algorithmic knowledge logic is taken as a theoretical basis, SPIN/Promela is used to model and analyze a large number of network safety protocols, and a model detection technology is used to design and realize a network safety protocol verification model generation system. In the system, for the different types of protocols, a corresponding modeling method is provided, such as a combined identity logic modeling method, a two-channel attacker interception modeling method, an attacker knowledge base function modeling method and a four-channel parallel modeling method; the method is used for the Promela modeling of the safety protocol; and the analysis requirements of several different types of safety protocols are effectively satisfied, and for the size of an attacker knowledge base in the safety protocol, a program enumeration method is used to construct. The three optimization strategies of static analysis, syntax reordering and partial order reduction are arranged in the system so that a state explosion problem in a safety protocol model detectionprocess can be effectively alleviated.

Description

technical field [0001] The invention relates to the technical field of formal verification of security protocols in information security, in particular to a formal verification method of security protocols based on model detection. Background technique [0002] At present, the upsurge of the Internet represented by the Internet is penetrating into every corner of society, so network security has become a hot spot that people pay attention to. The security protocol is the basis for ensuring the security of network communication, and is responsible for protecting the confidentiality, integrity, and consistency of communication data. However, due to the complexity of the network environment, the security properties of security protocols are often difficult to be effectively guaranteed. Security protocol is an important part of network security, therefore, people need an effective way to analyze and verify the security protocol strictly. [0003] In the face of security challe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/20H04L41/145H04L63/1416H04L63/1433
Inventor 肖美华杨科王西忠谌佳宋佳雯钟小妹
Owner EAST CHINA JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products