Secure Protocol Analysis Method with Hush FunctionsReport as inadecuate

Secure Protocol Analysis Method with Hush Functions - Download this document for free, or read online. Document in PDF available to download.

Strand space inherits the merit of algebra method, which can prove the security of protocol more precisely for it overcomes the shortcoming of inconvenience. But because of shortage of primitives it can’t describe some protocols as IKE, let alone verification. We made improvement to the original Strand Space by adding the description of hash function and some definitions with lemmas. So we can use the intensive model to analyze the protocols using hash function. At last, we analyze one IKE sub-protocol protocol.


strand space; IKE; protocol analysis

Cite this paper

Author: Jie Yang, Xianheng Ma, Weilian Luo



Related documents