NSPK Protocol Security Model Checking System Builder

被引:0
|
作者
Yan, Wang [1 ]
Ying, Liu
机构
[1] Zhongzhou Univ, Informat Engn Coll, Zhengzhou 450044, Peoples R China
关键词
cryptographic protocols; formal analysis; model checking; UPPAAL;
D O I
10.14257/ijsia.2015.9.7.28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic protocols are based cryptosystems based on interactive communication protocol, running on computer communication networks or distributed systems, by means of cryptographic algorithms to achieve key distribution, authentication and other purposes. In the safety analysis, model checking technology has a high degree of automation, can provide advantages such as counter-examples. The key application of model checking techniques cryptographic protocol analysis is that the full optimization model checking tools for modeling cryptographic protocols, especially for modeling intruders. Using symbolic model checking techniques and model checking tool UPPAAL automatic machine modeling, it is beneficial for the security of cryptographic protocols for analysis testing.
引用
收藏
页码:307 / 315
页数:9
相关论文
共 50 条
  • [31] Model Checking of TTCAN Protocol Using UPPAAL
    Liu Shuxin
    Yoshiura, Noriaki
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT IV, 2018, 10963 : 550 - 564
  • [32] Integrating model checking and simulation for protocol optimization
    Salmeron, Alberto
    Merino, Pedro
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2015, 91 (01): : 3 - 25
  • [33] Model checking of RADIUS protocol in wireless networks
    Kim, IG
    Choi, JY
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (01) : 397 - 398
  • [34] UNIVERSAL SECURITY FOR RANDOMNESS EXPANSION FROM THE SPOT-CHECKING PROTOCOL
    Miller, Carl A.
    Shi, Yaoyun
    SIAM JOURNAL ON COMPUTING, 2017, 46 (04) : 1304 - 1335
  • [35] An intruder model with message inspection for model checking security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    COMPUTERS & SECURITY, 2010, 29 (01) : 16 - 34
  • [36] Verification method of security model based on UML and model checking
    Cheng, Liang
    Zhang, Yang
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 699 - 708
  • [37] SAT-based Verification of NSPK Protocol Including Delays in the Network
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 388 - 393
  • [38] Enumeration Based Security Behavior Model Checking Algorithm
    Liu, Huaxiao
    Jin, Ying
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 808 - 813
  • [39] Model checking security protocols using a logic of belief
    Benerecetti, M
    Giunchiglia, F
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2000, 1785 : 519 - 534
  • [40] Model Checking of Security-Sensitive Business Processes
    Armando, Alessandro
    Ponta, Serena Elisa
    FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 66 - 80