Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method and system for security protocol formalization

A technology of security protocols and verification methods, applied in transmission systems, electrical components, etc., can solve the problems of non-purposeful construction methods, model detection state explosion, and error-prone problems.

Active Publication Date: 2021-11-30
EAST CHINA JIAOTONG UNIVERSITY
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Disadvantages of the static analysis method: it is necessary to manually analyze the protocol message flow in advance, and separately analyze the messages that can be intercepted by the attacker and the message set that the honest subject of the protocol needs to send, which is heavy workload and error-prone
Disadvantages of the dynamic construction method: the message fields are randomly filled, the construction method is purposeless, a large number of invalid messages are generated, and the number of states is too large, which easily leads to the problem of model detection state explosion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and system for security protocol formalization
  • Verification method and system for security protocol formalization
  • Verification method and system for security protocol formalization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Such as figure 1 As shown, a verification method for the formalization of security protocols includes the following steps:

[0073] The security protocol description to be verified is obtained from the security protocol specification;

[0074] Analyzing the security protocol specification to obtain a protocol configuration object;

[0075] Constructing a protocol model according to the protocol configuration object;

[0076] Constructing an attacker model based on the protocol model, and optimizing the attacker model;

[0077] describing the security properties of the security protocol according to linear temporal logic;

[0078] A communication environment is constructed based on the optimized attacker model, in which the model detector SPIN is used to verify whether the protocol model satisfies the security attribute, and if not, the model detector SPIN outputs an attack path.

[0079] In the above-mentioned embodiments, the protocol model is constructed for the s...

Embodiment 2

[0182] Such as figure 2 As shown, a verification system for the formalization of security protocols is characterized in that it includes:

[0183] The protocol description module is used to obtain the security protocol specification according to the security protocol description to be verified according to the formal security protocol description language;

[0184] A parsing module, configured to parse the security protocol specification to obtain a protocol configuration object;

[0185] A model building module, configured to build a protocol model according to the protocol configuration object;

[0186] It is also used to construct an attacker model based on the protocol model, and optimize the attacker model;

[0187] A security characterization module, configured to describe the security attributes of the security protocol according to linear temporal logic;

[0188] A verification module, configured to construct a communication environment based on the optimized attac...

Embodiment 3

[0190] A verification system for the formalization of security protocols, comprising a memory, a processor, and a computer program stored in the memory and operable on the processor, when the processor executes the computer program, the Verification methods for the formalization of security protocols as described above.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a verification method and system for security protocol formalization, and relates to the technical field of network security, and the method comprises the steps: describing a to-be-verified security protocol, and obtaining a security protocol specification; analyzing the security protocol specification to obtain a protocol configuration object; constructing a protocol model according to the protocol configuration object; constructing an attacker model based on the protocol model, and optimizing the attacker model; describing the security attribute of the security protocol according to the linear temporal logic; and constructing a communication environment based on the optimized attacker model, verifying whether the protocol model meets the security attribute or not through a model detector SPIN in the communication environment, and if not, outputting an attack path by the model detector SPIN. According to the method, modeling can be carried out on different types of security protocols, universality is achieved, the security of the security protocols can be automatically verified, and automation is achieved.

Description

technical field [0001] The present invention mainly relates to the technical field of network security, in particular to a verification method and system for formalizing security protocols. Background technique [0002] At present, most of the security protocols are modeled using the SPIN model, which requires manual coding and takes a lot of time, and different protocols need to rewrite the modeling code, which is highly repetitive, inefficient, and error-prone. In the automated modeling scheme for security protocol analysis, the protocol description language used is relatively complex and difficult to write, and users need to spend a high learning cost. [0003] At present, in the modeling of the attacker, the static analysis method and the dynamic message construction method are used to construct the attack message. Disadvantages of the static analysis method: It is necessary to manually analyze the protocol message flow in advance, and separately analyze the messages th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 肖美华钟小妹欧阳日
Owner EAST CHINA JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products