Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A verification method and system for formalization of security protocols

A security protocol and verification method technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of model detection state explosion, error-prone, heavy workload, etc.

Active Publication Date: 2022-02-22
EAST CHINA JIAOTONG UNIVERSITY
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Disadvantages of the static analysis method: it is necessary to manually analyze the protocol message flow in advance, and separately analyze the messages that can be intercepted by the attacker and the message set that the honest subject of the protocol needs to send, which is heavy workload and error-prone
Disadvantages of the dynamic construction method: the message fields are randomly filled, the construction method is purposeless, a large number of invalid messages are generated, and the number of states is too large, which easily leads to the problem of model detection state explosion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification method and system for formalization of security protocols
  • A verification method and system for formalization of security protocols
  • A verification method and system for formalization of security protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Such as figure 1 As shown, a verification method for the formalization of security protocols includes the following steps:

[0073] The security protocol description to be verified is obtained from the security protocol specification;

[0074] Analyzing the security protocol specification to obtain a protocol configuration object;

[0075] Constructing a protocol model according to the protocol configuration object;

[0076] Constructing an attacker model based on the protocol model, and optimizing the attacker model;

[0077] describing the security properties of the security protocol according to linear temporal logic;

[0078] A communication environment is constructed based on the optimized attacker model, in which the model detector SPIN is used to verify whether the protocol model satisfies the security attribute, and if not, the model detector SPIN outputs an attack path.

[0079] In the above-mentioned embodiments, the protocol model is constructed for the s...

Embodiment 2

[0182] Such as figure 2 As shown, a verification system for the formalization of security protocols is characterized in that it includes:

[0183] The protocol description module is used to obtain the security protocol specification according to the security protocol description to be verified according to the formal security protocol description language;

[0184] A parsing module, configured to parse the security protocol specification to obtain a protocol configuration object;

[0185] A model building module, configured to build a protocol model according to the protocol configuration object;

[0186] It is also used to construct an attacker model based on the protocol model, and optimize the attacker model;

[0187] A security characterization module, configured to describe the security attributes of the security protocol according to linear temporal logic;

[0188] A verification module, configured to construct a communication environment based on the optimized attac...

Embodiment 3

[0190] A verification system for the formalization of security protocols, comprising a memory, a processor, and a computer program stored in the memory and operable on the processor, when the processor executes the computer program, the Verification methods for the formalization of security protocols as described above.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a verification method and system for the formalization of a safety protocol, and relates to the technical field of network safety. The method includes: describing the safety protocol to be verified, obtaining the safety protocol specification; The protocol configuration object builds the protocol model; builds the attacker model based on the protocol model, and optimizes the attacker model; describes the security attributes of the security protocol according to the linear temporal logic; builds the communication environment based on the optimized attacker model, and in the communication environment Verify whether the protocol model satisfies the security properties through the model detector SPIN, if not, the model detector SPIN outputs the attack path. The invention can model different types of security protocols, has universality, can automatically verify the security of security protocols, and has automaticity.

Description

technical field [0001] The present invention mainly relates to the technical field of network security, in particular to a verification method and system for formalizing security protocols. Background technique [0002] At present, most of the security protocols are modeled using the SPIN model, which requires manual coding and takes a lot of time, and different protocols need to rewrite the modeling code, which is highly repetitive, inefficient, and error-prone. In the automated modeling scheme for security protocol analysis, the protocol description language used is relatively complex and difficult to write, and users need to spend a high learning cost. [0003] At present, in the modeling of the attacker, the static analysis method and the dynamic message construction method are used to construct the attack message. Disadvantages of the static analysis method: It is necessary to manually analyze the protocol message flow in advance, and separately analyze the messages th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
Inventor 肖美华钟小妹欧阳日
Owner EAST CHINA JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products