Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Model Checking Method for Security Exchange Protocol

A security exchange and model detection technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of the attacker model and the attacker model inapplicable to the verification of security attributes, and the inability to model cryptographic primitives. Save time and space requirements, solve state explosion problems, easy-to-use effects

Inactive Publication Date: 2018-08-03
TIANJIN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, there have been more and more researches on the formal verification of security protocols. The main research methods include methods based on logical reasoning, methods based on theorem proving, string space methods, and model checking methods, and many automated security protocols have been developed. Verification tools, such as Athena, ProVerif, Murphi, and AVISPA, etc., these tools have a good effect on the verification of the secrecy and authentication of security protocols, but have certain limitations on fairness and non-repudiation, for example, they cannot Modeling of cryptographic primitives, failure to introduce attacker model or attacker model is not suitable for verification of some security properties, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Model Checking Method for Security Exchange Protocol
  • A Model Checking Method for Security Exchange Protocol
  • A Model Checking Method for Security Exchange Protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. If there are exemplary contents in these embodiments, they should not be construed as limiting the present invention.

[0021] Such as figure 1 As shown, the present invention uses LTL linear sequential logic to describe the fairness and non-repudiation of the protocol participants, and converts it into an automaton, thereby facilitating verification. Detection methods for fairness and non-repudiation verification for secure exchange protocols. Specifically:

[0022] 1. Based on the Proverif modeling language Pi calculus, the selection operator is extended to formally describe the security exchange protocol. The operational semantics of the modeling language extended Pi calculus is realized based on the Labeled Transition System (LTS) , the extended Pi calculus can model cryptographic primitives;

[0023] 2. The fairness and non-repudiation o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting a security exchange protocol model. The steps of the method include: 1) constructing a security exchange protocol model; 2) constructing a security attribute model; 3) constructing an attacker model; 4) state reduction and model detection. Compared with the prior art, the present invention can verify the security attributes of the protocol by modeling the security exchange protocol and its fairness and non-repudiation, and improve The verification effect is achieved, and the state reduction is realized, the state explosion problem is solved, and the model detection system is finally realized, which is convenient to use.

Description

technical field [0001] The invention relates to the field of mobile security, in particular to a hybrid detection technology combining software static detection and dynamic detection, which can detect malicious software based on an attack tree. Background technique [0002] With the development of computer technology and network technology, e-commerce has penetrated into all aspects of daily life and work, such as e-government, personal online shopping, enterprise e-commerce, contract signing and e-auction. However, with the development of network technology, Internet security issues have become more and more serious, and have further affected the development of e-commerce. As the cornerstone of e-commerce, the security and fairness of security exchange protocols are increasingly important, and have become a hot spot in the field of security research. According to the different purposes of the agreement, the fair exchange agreement can be divided into email authentication a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 李晓红胥佳逸许光全胡静张蕾李笑如
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products