J4

• 计算机科学 • 上一篇    下一篇

网络安全中的两种认证协议及安全性分析

安兴朝1,2, 房至一1,2, 丛士佺1,2   

  1. 1. 吉林大学 计算机科学与技术学院, 长春 130012; 2. 吉林大学 符号计算与知识工程教育部重点实验室, 长春 130012
  • 收稿日期:2006-05-29 修回日期:1900-01-01 出版日期:2006-08-26 发布日期:2006-11-26
  • 通讯作者: 房至一

Two Authentication Protocols of Network Security and Their Security Analysis

AN Xingchao1,2, FANG Zhiyi1,2, CONG Shiquan1,2   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130012, China; 2. Key Laboratory ofSymbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun 130012, China
  • Received:2006-05-29 Revised:1900-01-01 Online:2006-08-26 Published:2006-11-26
  • Contact: FANG Zhiyi

摘要: 研究对称密钥算法产生的安全问题. 根据网络安全的特点设计了两种简单认证协议: 点到点简单认证协议和可信第三方的简单认证协议. 通过使用形式化分析方法(基于知识与信念推理的模态逻辑方法〖CD2〗SVO逻辑), 对以上两个认证协议进行了安全性分析, 证实其达到了面向密钥的目标、 密钥确认目标和相互信任密钥目标.

关键词: 认证协议, 形式化分析, SVO逻辑

Abstract: Investigations into the problem how to implement safe communication in the network and also into the problem emerged from symmetric key algorithm were made. And two kinds of practical authentication protocols, Point to Point Simple Authentication Protocol and Trusted Third Party Simple Authentication Protocol, were designed based on the characteristics of the network security. And we also have analysed the security of the two protocols to make sure that both of them have achieved the purpose of keyoriented, key affirmation and the aim of trusting the key of its peer via the formal analysis method (the mode logic method based on knowledge and belief consequence--SVO logic).

Key words: authentication protocol, formal analysis, SVO logic

中图分类号: 

  • TP393