J4

• 计算机科学 • Previous Articles     Next Articles

Two Authentication Protocols of Network Security and Their Security Analysis

AN Xingchao1,2, FANG Zhiyi1,2, CONG Shiquan1,2   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130012, China; 2. Key Laboratory ofSymbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun 130012, China
  • Received:2006-05-29 Revised:1900-01-01 Online:2006-08-26 Published:2006-11-26
  • Contact: FANG Zhiyi

Abstract: Investigations into the problem how to implement safe communication in the network and also into the problem emerged from symmetric key algorithm were made. And two kinds of practical authentication protocols, Point to Point Simple Authentication Protocol and Trusted Third Party Simple Authentication Protocol, were designed based on the characteristics of the network security. And we also have analysed the security of the two protocols to make sure that both of them have achieved the purpose of keyoriented, key affirmation and the aim of trusting the key of its peer via the formal analysis method (the mode logic method based on knowledge and belief consequence--SVO logic).

Key words: authentication protocol, formal analysis, SVO logic

CLC Number: 

  • TP393