次全国计算机安全学术交流会.ppt

上传人:xt****7 文档编号:3896016 上传时间:2019-12-28 格式:PPT 页数:24 大小:287.54KB
返回 下载 相关 举报
次全国计算机安全学术交流会.ppt_第1页
第1页 / 共24页
次全国计算机安全学术交流会.ppt_第2页
第2页 / 共24页
次全国计算机安全学术交流会.ppt_第3页
第3页 / 共24页
点击查看更多>>
资源描述
网络安全认证协议形式化分析,肖美华南昌大学信息工程学院(南昌,330029)中国科学院软件研究所计算机科学重点实验室(北京,100080),2019/12/28,第二十次全国计算机安全学术交流会,2,Organization,IntroductionRelatedWorkFormalSystemNotationIntrudersAlgorithmicKnowledgeLogicVerificationUsingSPIN/PromelaConclusion,2019/12/28,第二十次全国计算机安全学术交流会,3,Introduction,Cryptographicprotocolsareprotocolsthatusecryptographytodistributekeysandauthenticateprincipalsanddataoveranetwork.Formalmethods,acombinationofamathematicalorlogicalmodelofasystemanditsrequirements,togetherwithaneffectiveprocedurefordeterminingwhetheraproofthatasystemsatisfiesitsrequirementsiscorrect.Model;Requirement(Specification);Verification.,2019/12/28,第二十次全国计算机安全学术交流会,4,Introduction(cont.),Incryptographicprotocols,itisverycrucialtoensure:Messagesmeantforaprincipalcannotberead/accessedbyothers(secrecy);Guaranteegenuinenessofthesenderofthemessage(authenticity);Integrity;Non-Repudiation(NRO,NRR);Fairness,etc.,2019/12/28,第二十次全国计算机安全学术交流会,5,RelatedWork,Techniquesofverifyingsecuritypropertiesofthecryptographicprotocolscanbebroadlycategorized:methodsbasedonbelieflogics(BANLogic)-calculusbasedmodelsstatemachinemodels(ModelChecking)Modelcheckingadvantages(comparewiththeoryproving):automatic;counterexampleifviolationUseLTL(Lineartemporallogic)tospecifypropertiesFDR(Lowe);Mur(Mitchell);Interrogator(Millen);Brutus(Marrero)SPIN(Hollzmann)theoremproverbasedmethods(NRL,Meadows)methodsbasedonstatemachinemodelandtheoremprover(Athena,Dawn)TypecheckingISCAS,LOIS,(inChina),2019/12/28,第二十次全国计算机安全学术交流会,6,Notation,(1)MessagesaAtom:=C|N|k|mMsg:=a|mm|mk(2)ContainRelationship()mam=amm1m2m=m1m2mm1mm2mm1km=m1kmm1Submessage:sub-msgs(m)mMsg|mm,2019/12/28,第二十次全国计算机安全学术交流会,7,Notation,(3)Derivation(,Dolev-Yaomodel)mBBmBmBmBmm(pairing)BmmBmBm(projection)BmBkBmk(encryption)BmkBk-1Bm(decryption),2019/12/28,第二十次全国计算机安全学术交流会,8,Notation,(4)PropertiesLemma1.BmBBBmLemma2.BmBmmBmLemma3.BmXmBX(Y:Ysub-msgs(m):XYBY)(b:bB:Yb)(Z,k:ZMsgkKey:Y=ZkBk-1)Lemma4.(k,b:kKeybB:kbAkABk)(z:zsub-msgs(x):azAz)(b:bB:abAa),2019/12/28,第二十次全国计算机安全学术交流会,9,LogicofAlgorithmicKnowledge,Definition1.PrimitivepropositionsP0sforsecurity:p,qP0s:=sendi(m)Principalisentmessagemrecvi(m)Principalireceivedmessagemhasi(m)Principalihasmessagem,2019/12/28,第二十次全国计算机安全学术交流会,10,LogicofAlgorithmicKnowledge,Definition2.AninterpretedsecuritysystemS=(R,R),whereRisasystemforsecurityprotocols,andRisthefollowinginterpretationoftheprimitivepropositionsinR.R(r,m)(sendi(m)=trueiffjsuchthatsend(j,m)ri(m)R(r,m)(recvi(m)=trueiffrecv(m)ri(m)R(r,m)(hasi(m)=trueiffmsuchthatmmandrecv(m)ri(m),2019/12/28,第二十次全国计算机安全学术交流会,11,LogicofAlgorithmicKnowledge,Definition3.Aninterpretedalgorithmicsecuritysystem(R,R,A1,A2,An),whereRisasecuritysystem,andRistheinterpretationinR,Aiisaknowledgealgorithmforprincipali.,2019/12/28,第二十次全国计算机安全学术交流会,12,Algorithmknowledgelogic,AiDY(hasi(m),l)K=keyof(l)foreachrecv(m)inldoifsubmsg(m,m,K)thenreturn“Yes”return“No”submsg(m,m,K)ifm=mthenreturntrueifmism1kandk-1Kthenreturnsubmsg(m,m1,K)ifmism1.m2thenreturnsubmsg(m,m1,K)submsg(m,m2,K)returnfalse,2019/12/28,第二十次全国计算机安全学术交流会,13,Cont.,getkeys(m,K)ifmKeythenreturnmifmism1kandk-1Kthenreturngetkeys(m1,K)ifmism1.m2thenreturngetkeys(m1,K)getkeys(m2,K)returnkeysof(l)Kinitkeys(l)loopuntilnochangeinKkgetkeys(m,K)(whenrecv(m)l)returnK,2019/12/28,第二十次全国计算机安全学术交流会,14,VerificationUsingSPIN/Promela,SPINisahighlysuccessfulandwidelyusedsoftwaremodel-checkingsystembasedonformalmethodsfromComputerScience.Ithasmadeadvancedtheoreticalverificationmethodsapplicabletolargeandhighlycomplexsoftwaresystems.InApril2002thetoolwasawardedtheprestigiousSystemSoftwareAwardfor2001bytheACM.SPINusesahighlevellanguagetospecifysystemsdescriptions,includingprotocols,calledPromela(PROcessMEtaLAnguage).,2019/12/28,第二十次全国计算机安全学术交流会,15,BAN-YahalomProtocol,1AB:A,Na2BS:B,Nb,A,NaKbs3SA:Nb,B,Kab,NaKas,A,Kab,NbKbs4AB:A,Kab,NbKbs,NbKab,2019/12/28,第二十次全国计算机安全学术交流会,16,Attack1(intruderimpersonatesBobtoAlice),.1AI(B):A,Na.1I(B)A:B,Na.2AI(S):A,Na,B,NaKas.2I(A)S:A,Na,B,NaKas.3SI(B):Na,A,Kab,NaKas,B,Kab,NaKbs.3I(S)A:Ne,B,Kab,NaKas,A,Kab,NaKbs.4AI(B):A,Kab,NbKbs,NeKab,2019/12/28,第二十次全国计算机安全学术交流会,17,Attack2(intruderimpersonatesAlice),.1AB:A,Na.2BS:B,Nb,A,NaKbs.1I(A)B:A,(Na,Nb).2BI(S):B,Nb,A,Na,NbKas.3(Omitted).4I(A)B:A,Na,NbKbs,NbNa,2019/12/28,第二十次全国计算机安全学术交流会,18,Attack3,.1AB:A,Na.2BS:B,Nb,A,NaKbs.1I(B)A:B,Nb.2AI(S):A,Na,B,NbKas.2I(A)S:A,Na,B,NbKas.3SI(B):Na,A,Kab,NbKbs,B,Kab,NaKas.3I(S)A:Nb,B,Kab,NaKas,A,Kab,NbKbs.4AB:A,Kab,NbKbs,NbKab,2019/12/28,第二十次全国计算机安全学术交流会,19,Optimizationstrategies,UsingstaticanalysisandsyntacticalreorderingtechniquesThetwotechniquesareillustratedusingBAN-Yahalomverificationmodelasthebenchmark.describethemodelasOriginalversiontowhichstaticanalysisandthesyntacticalreorderingtechniquesarenotapplied,thestaticanalysistechniqueisonlyusedasFixedversion(1),boththestaticanalysisandthesyntacticalreorderingtechniquesareusedasFixedversion(2).,2019/12/28,第二十次全国计算机安全学术交流会,20,Experimentalresultsshowtheeffectiveness,2019/12/28,第二十次全国计算机安全学术交流会,21,Needham-SchroederAuthenticationProtocol,2019/12/28,第二十次全国计算机安全学术交流会,22,AttacktoN-SProtocol(foundbySPIN),2019/12/28,第二十次全国计算机安全学术交流会,23,Conclusion,basedonalogicofknowledgealgorithm,aformaldescriptionoftheintrudermodelunderDolev-Yaomodelisconstructed;astudyonverifyingthesecurityprotocolsfollowingaboveusingmodelcheckerSPIN,andthreeattackshavebeenfoundsuccessfullyinonlyonegeneralmodelaboutBAN-Yahalomprotocol;somesearchstrategiessuchasstaticanalysisandsyntacticalreorderingareappliedtoreducethemodelcheckingcomplexityandtheseapproacheswillbenefittheanalysisofmoreprotocols.ScalibilityInanycase,havingalogicwherewecanspecifytheabilitiesofintrudersisanecessaryprerequisitetousingmodel-checkingtechniques.,2019/12/28,第二十次全国计算机安全学术交流会,24,Thanks!,
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 图纸专区 > 课件教案


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!