Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Symbolic Modeling System for Network Security Protocols

A network security protocol and protocol technology, applied in the field of network security, can solve problems such as easy defects in network security protocol design, difficult model verification, difficult protocol modeling, etc.

Active Publication Date: 2021-12-17
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the above-mentioned deficiencies in the prior art, a symbolic modeling system of a network security protocol provided by the present invention solves the problems that the design of the network security protocol is prone to defects, the protocol is difficult to model, and the model is difficult to verify

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Symbolic Modeling System for Network Security Protocols
  • A Symbolic Modeling System for Network Security Protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0062] The application scenarios and architecture of the present invention are as follows: figure 2 As shown, the operation of a network protocol is usually initiated by one protocol participant, and another protocol participant gives a response. In this process, the composition of the request reply information may be encrypted, signed, etc., and the information is transmitted through the network public channel. Attackers ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a symbol modeling system of a network security protocol. The present invention includes modeling modules of protocol entity modeling, attacker modeling, channel modeling and cryptographic primitives, and can describe the behavior of protocol participating entities in detail and accurately, considering that attackers have various attack methods; Whether the attack can be resisted with the participation of the secure channel; detailed cryptographic primitive modeling is carried out for the entities participating in the protocol and the operations that the attacker can perform, which can convert the informal description of the protocol into an accurate formal description sentence by sentence. The symbolic model established by this method is basically consistent with the protocol description. Through the analysis and verification of the model, the loopholes in the protocol design can be found, and the defects in the design of the network security protocol can be solved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a symbolic modeling system of a network security protocol. Background technique [0002] Network security protocols are the basis for creating a network security environment and the key technology for building a secure network. Designing and ensuring the security and correctness of network security protocols can fundamentally ensure network security and avoid information leakage problems such as loss of network data information or file corruption due to insufficient network security levels. In the application of computer network, people have done a lot of research on the security protocol of computer communication, in order to improve the security of network information transmission. [0003] There are some problems with existing protocol modeling methods. Some modeling methods are readable, but the description is inaccurate and ambiguous, which makes modeling more dif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/0236H04L63/06H04L63/1416H04L63/1433H04L63/1441H04L63/16H04L63/20H04L41/145
Inventor 赵伟张文政何琨刘正斌穆道光汤殿华王林
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products