A symbolic modeling system of network security protocol

A network security protocol and protocol technology, applied in the field of network security, can solve problems such as network security protocol design is prone to defects, models are difficult to verify, and protocols are difficult to model

Active Publication Date: 2021-03-16
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the above-mentioned deficiencies in the prior art, a symbolic modeling system of a network security protocol provided by the present invention s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A symbolic modeling system of network security protocol
  • A symbolic modeling system of network security protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0062] The application scenarios and architecture of the present invention are as follows: figure 2 As shown, the operation of a network protocol is usually initiated by one protocol participant, and another protocol participant gives a response. In this process, the composition of the request reply information may be encrypted, signed, etc., and the information is transmitted through the network public channel. Attackers ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a symbol modeling system of a network security protocol. The system comprises a protocol entity modeling module, an attacker modeling module, a channel modeling module and a password primitive modeling module, so that protocol participation entity behaviors can be described meticulously and accurately, and various attack means of attackers are considered; whether an attackcan be resisted or not is considered under the participation of a secure channel; according to the method, detailed cryptographic primitive modeling is carried out on operations which can be carried out by a protocol participation entity and an attacker, non-formalized description of a protocol can be converted into accurate formalized description sentence by sentence, and a symbol model established by the method is basically consistent with the protocol description. By analyzing and verifying the model, loopholes existing in protocol design can be found, and then the defects existing in design of the network security protocol can be overcome.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a symbolic modeling system of a network security protocol. Background technique [0002] Network security protocols are the basis for creating a network security environment and the key technology for building a secure network. Designing and ensuring the security and correctness of network security protocols can fundamentally ensure network security and avoid information leakage problems such as loss of network data information or file corruption due to insufficient network security levels. In the application of computer network, people have done a lot of research on the security protocol of computer communication, in order to improve the security of network information transmission. [0003] There are some problems with existing protocol modeling methods. Some modeling methods are readable, but the description is inaccurate and ambiguous, which makes modeling more dif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/0236H04L63/06H04L63/1416H04L63/1433H04L63/1441H04L63/16H04L63/20H04L41/145
Inventor 赵伟张文政何琨刘正斌穆道光汤殿华王林
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products