A Formal Description and Verification of Authentication Protocol
Identity authentication,as the first step to realize the network security,is the key technology for secure exchange of the online commercial information.Moreover,if there is any leak in the authentication protocol, secret information will leak out consequentially. It is necessary to adopt some formalized method to describe and prove the authentication protocol.In this paper the colored Petri Net is employed to describe the authentication protocol,and simultaneously the combined strategy of 1-reachable analysis and conversing analysis has been put forward to verify the security of this authentication protocol.
Identity Authentication Protocol Petri Net Reachable Tree Reachable Analysis Security
Zhanting Yuan Xu Kang Qiuyu Zhang Shuang Liang
College of Computer and Conununication,Lanzhou University of Technology,Lanzhon,Gansu,730050,China
国际会议
大连
英文
735-740
2008-07-27(万方平台首次上网日期,不代表论文的发表时间)