Secure Protocol Analysis Method with Hush FunctionsReportar como inadecuado




Secure Protocol Analysis Method with Hush Functions - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Strand space inherits the merit of algebra method, which can prove the security of protocol more precisely for it overcomes the shortcoming of inconvenience. But because of shortage of primitives it can’t describe some protocols as IKE, let alone verification. We made improvement to the original Strand Space by adding the description of hash function and some definitions with lemmas. So we can use the intensive model to analyze the protocols using hash function. At last, we analyze one IKE sub-protocol protocol.

KEYWORDS

strand space; IKE; protocol analysis

Cite this paper







Autor: Jie Yang, Xianheng Ma, Weilian Luo

Fuente: http://www.scirp.org/



DESCARGAR PDF




Documentos relacionados