Cryptographic protocol verification method

A cryptographic protocol and verification method technology, applied in transmission systems, electrical components, etc., can solve problems such as incorrect proof results, inaccurate target models, and difficulties

Pending Publication Date: 2020-10-09
SOUTHWEST UNIVERSITY
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Which logic to use for accurate modeling is the most difficult, the inaccurate model will not accurately describe the cryptographic protocol, and the target model is also difficult to be accurate, which directly leads to incorrect proof results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic protocol verification method
  • Cryptographic protocol verification method
  • Cryptographic protocol verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0110] Aiming at the problems existing in the prior art, the present invention provides a cryptographic protocol verification method. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0111] like figure 1 As shown, the cryptographic protocol verification method provided by the present invention comprises the following steps:

[0112] S101: Under the set network environment, a cryptographic protocol is given;

[0113] S102: Describe the cryptographic protocol according to the syntax and semantics of dynamic cognitive logic;

[0114] S103: Establish a behavior model a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and discloses a cryptographic protocol verification method. The method comprises: in a set network environment, giving a cryptographic protocol; describing a cryptographic protocol according to the grammar and semantics of the dynamic cognitive logic; establishing a behavior model according to behavior characteristics involved in the cryptographic protocol to accurately describe protocol behaviors and a behavior execution process, wherein the protocol behavior execution process is a protocol operation process, and the process is also a process of completely formalizing the protocol; modeling a target of the cryptographic protocol, and describing a sub-target; determining whether the protocol meets the safety target or not according to analysis of the behavior model, if so, ending the protocol, and indicating that the protocol is safe. According to the invention, knowledge owned by participants in the protocol is clearly described, and the logic expression method can accurately describe each step of protocol execution; and meanwhile, the behavior model is described simply and clearly, so that the proving process is rigorous and perfect.

Description

technical field [0001] The invention belongs to the technical field of information security, and provides a password protocol verification method. Background technique [0002] At present, the integration of computer technology and communication technology has made computer network communication increasingly developed and popular. In network communication, communication security is a very important issue, and it is increasingly becoming a concern of people, especially in e-commerce and other fields. A cryptographic protocol is a network protocol that uses a cryptographic mechanism. The so-called network protocol refers to a collection of rules, standards, or conventions established for data exchange in computer network communications. The cryptographic protocol refers to the addition of cryptographic technology to ensure information security in network communication, that is, a protocol that uses a cryptographic mechanism. Cryptographic protocols are becoming more and more...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20H04L69/02H04L69/26
Inventor 陈小娟邓辉文
Owner SOUTHWEST UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products