An attribute-driven security protocol symbolic model detection method and system

A security protocol and model detection technology, applied in the field of protocol verification, can solve the problems that the formal verification tool of the security protocol cannot be time-series modeling and analysis, false counterexamples, etc., to achieve the effect of automatic formal verification

Active Publication Date: 2021-07-02
军事科学院系统工程研究院网络信息研究所
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide an attribute-driven security protocol symbolic model detection scheme to solve the problem of false negative examples in the security protocol verification method of general symbolic model detection in the prior art, and the inability of the security protocol formal verification tool to check the time sequence Technical issues of modeling and analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An attribute-driven security protocol symbolic model detection method and system
  • An attribute-driven security protocol symbolic model detection method and system
  • An attribute-driven security protocol symbolic model detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] The first aspect of the present invention provides an attribute-driven security protocol symbolic model detection method. figure 1 It is a flow chart of an attribute-driven security protocol symbolic model detection method according to an embodiment of the present invention, such as figure 1 As shown, the method includes: step S1, obtaining the state machine model and the process calculus model of the security protocol respectively; step S2, configuring the timing properties of the security protocol, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attribute-driven security protocol symbolic model detection method, system and medium. The method includes: step S1, obtaining the state machine model and the process calculus model of the security protocol respectively; step S2, configuring the timing properties of the security protocol, the timing properties are determined by the time operator and logic operator of the timing logic To describe; step S3, verify the timing properties based on the state machine model, to obtain existing counterexamples; step S4, refine the timing properties based on the counterexamples to obtain security properties, call the ProVerif security protocol verifier, The security properties are verified based on the process calculus model. The method can improve the correctness of the traditional model detection in the verification of the timing of the security protocol, effectively avoid false negative examples, and make up for the problem that the formal verification tool of the security protocol cannot model and analyze the timing.

Description

technical field [0001] The invention relates to the field of protocol verification, in particular to an attribute-driven security protocol symbolic model detection method and system. Background technique [0002] General symbolic model checking technology has achieved remarkable success in computer hardware, control system and so on. In terms of security protocol verification, general model checking technology can be used to verify the timing properties of security protocols, especially the liveness of the verification protocol. It uses the state transition system of the security protocol as an analysis model to analyze the timing properties of the protocol, so as to verify the security properties that the security protocol should satisfy. [0003] Security protocols generally have complex cryptographic mechanisms, and general symbolic model detection cannot analyze the relationship between cryptographic operations. For example, if a state in the model receives a symmetric...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F30/20G06F21/64G06F21/60G06F9/448
CPCG06F21/602G06F21/64G06F9/4498G06F30/20
Inventor 杨林张京京高先明冯涛马琳茹
Owner 军事科学院系统工程研究院网络信息研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products