Secure Protocol Analysis Method with Hush FunctionsReport as inadecuate




Secure Protocol Analysis Method with Hush Functions - Download this document for free, or read online. Document in PDF available to download.

Strand space inherits the merit of algebra method, which can prove the security of protocol more precisely for it overcomes the shortcoming of inconvenience. But because of shortage of primitives it can’t describe some protocols as IKE, let alone verification. We made improvement to the original Strand Space by adding the description of hash function and some definitions with lemmas. So we can use the intensive model to analyze the protocols using hash function. At last, we analyze one IKE sub-protocol protocol.

KEYWORDS

strand space; IKE; protocol analysis

Cite this paper







Author: Jie Yang, Xianheng Ma, Weilian Luo

Source: http://www.scirp.org/



DOWNLOAD PDF




Related documents