Attribute-driven security protocol symbolization model detection method and system

A security protocol and model checking technology, applied in the field of protocol verification, which can solve the problems that formal verification tools of security protocols cannot be time-series modeling and analysis, false counterexamples, etc.

Active Publication Date: 2021-05-18
军事科学院系统工程研究院网络信息研究所
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide an attribute-driven security protocol symbolic model detection scheme to solve the problem of false negative examples in the security protocol verification method of general symbolic model detection in the prior art, and the inability of the security protocol formal verification tool to check the time sequence Technical issues of modeling and analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-driven security protocol symbolization model detection method and system
  • Attribute-driven security protocol symbolization model detection method and system
  • Attribute-driven security protocol symbolization model detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] The first aspect of the present invention provides an attribute-driven security protocol symbolic model detection method. figure 1 It is a flow chart of an attribute-driven security protocol symbolic model detection method according to an embodiment of the present invention, such as figure 1 As shown, the method includes: step S1, obtaining the state machine model and the process calculus model of the security protocol respectively; step S2, configuring the timing properties of the security protocol, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attribute-driven security protocol symbolization model detection method and system and a medium. The method comprises the following steps: S1, respectively acquiring a state machine model and a process calculation model of the security protocol; S2, configuring a time sequence property of the security protocol, wherein the time sequence property is described by a time operator and a logic operator of time sequence logic; S3, verifying the time sequence property based on the state machine model to obtain an existing counter example; and S4, refining the time sequence property based on the counter example to obtain a security property, calling a ProVeif security protocol verifier, and verifying the security property based on the process calculation model. According to the method, the correctness of traditional model detection in the aspect of security protocol time sequence verification can be improved, the condition of false counter examples is effectively avoided, and the problem that a security protocol formal verification tool cannot perform time sequence modeling and analysis is solved.

Description

technical field [0001] The invention relates to the field of protocol verification, in particular to an attribute-driven security protocol symbolic model detection method and system. Background technique [0002] General symbolic model checking technology has achieved remarkable success in computer hardware, control system and so on. In terms of security protocol verification, general model checking technology can be used to verify the timing properties of security protocols, especially the liveness of the verification protocol. It uses the state transition system of the security protocol as an analysis model to analyze the timing properties of the protocol, so as to verify the security properties that the security protocol should satisfy. [0003] Security protocols generally have complex cryptographic mechanisms, and general symbolic model detection cannot analyze the relationship between cryptographic operations. For example, if a state in the model receives a symmetric...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/20G06F21/64G06F21/60G06F9/448
CPCG06F21/602G06F21/64G06F9/4498G06F30/20
Inventor 杨林张京京高先明冯涛马琳茹
Owner 军事科学院系统工程研究院网络信息研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products