会议专题

A Formal Description and Verification of Authentication Protocol

Identity authentication,as the first step to realize the network security,is the key technology for secure exchange of the online commercial information.Moreover,if there is any leak in the authentication protocol, secret information will leak out consequentially. It is necessary to adopt some formalized method to describe and prove the authentication protocol.In this paper the colored Petri Net is employed to describe the authentication protocol,and simultaneously the combined strategy of 1-reachable analysis and conversing analysis has been put forward to verify the security of this authentication protocol.

Identity Authentication Protocol Petri Net Reachable Tree Reachable Analysis Security

Zhanting Yuan Xu Kang Qiuyu Zhang Shuang Liang

College of Computer and Conununication,Lanzhou University of Technology,Lanzhon,Gansu,730050,China

国际会议

2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)

大连

英文

735-740

2008-07-27(万方平台首次上网日期,不代表论文的发表时间)