Formalized modeling method of handshake protocol based on HCPN model

A technology of formal modeling and handshake protocol, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as blind selection of formal analysis tools for security protocols

Inactive Publication Date: 2021-03-26
LANZHOU UNIVERSITY OF TECHNOLOGY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there is a certain blindness in the selection of formal analysis tools for security protocols

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Formalized modeling method of handshake protocol based on HCPN model
  • Formalized modeling method of handshake protocol based on HCPN model
  • Formalized modeling method of handshake protocol based on HCPN model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention is based on the formal modeling method of the handshake agreement of HCPN model, and its steps are:

[0028] Step (1) Define the TLS1.3 handshake protocol based on the HCPN model, use a single color set and a composite color set to distinguish different data types of the protocol, and define data types such as places, transitions, arcs, encryption and decryption functions used by the protocol;

[0029] Step (2) Establish a formalized model of pre-master key transmission based on the HCPN model, the pre-master key is used as a key parameter, the client uses a symmetric encryption algorithm to encrypt and then sends it to the server, and the server decrypts it to obtain the pre-master key;

[0030] Step (3) Establish a formalized identity authentication model between the client and the server based on the HCPN model. The server sends encrypted identity information to the client. After the client decrypts, it queries the certificate chain to verify the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a formalized modeling method of a handshake protocol based on an HCPN model, and the method comprises the following steps: 1, defining a TLS1.3 handshake protocol based on theHCPN model, distinguishing different data types by using a single color set and a composite color set, and defining data types such as a library, a transition, an arc, an encryption and decryption function and the like used by the protocol; 2, establishing a pre-master key transmission model, sending the encrypted key material by the client, and decrypting the encrypted key material by the serverto obtain the pre-master key; 3, establishing an identity authentication model, sending encrypted identity information to the opposite side by the client and the server, and inquiring the certificatechain to verify the identity information after the opposite side receives decryption, thereby completing identity information authentication of the two sides. 4, adding a Dolev-Yao attack model, and establishing a model for a TLS1.3 handshake protocol pre-master key transmission and identity authentication process; 5, analyzing a state space report generated by the TLS1.3 handshake protocol, and verifying whether the security attribute of the protocol conforms to the protocol specification or not.

Description

technical field [0001] The invention in this paper relates to a protocol security analysis method for TLS1.3 handshake protocol modeling based on the HCPN model. The formal modeling method based on the HCPN model can perform formal security analysis and evaluation on the TLS1.3 handshake protocol, which belongs to the protocol formal security assessment method. Background technique [0002] As a protocol security mechanism, the TLS protocol was originally evolved from the Secure Sockets Layer (Secure Sockets Layer: SSL) developed by Netscape Communications in 1995, and then specified by the Internet Engineering Task Force (IETF) Standardized and gradually upgraded to TLS1.2, the latest TLSl.3 version protocol content has greater changes than before, which enhances the security of the algorithm, reduces the number of sessions, and improves efficiency. [0003] At present, there is a certain blindness in the selection of formal analysis tools for security protocols. The mode...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/0442H04L63/0823H04L63/168H04L63/20
Inventor 冯涛田学成方君丽龚翔蒋泳波杜瑾泽
Owner LANZHOU UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products