会议专题

Analyzing and Verifying Petri Net Model of Security Protocol Based on Maria

Formal specification and analysis of security protocol is a research hotspot in network security at present. This paper models authentication service exchange of Public-Key Kerberos Protocol and an attack against this protocol with Petri nets. The Maria Tool automates analysis and verification of the model and finds that PKJMT-26 protocol has a security flaw. So we improve the model according to PKINIT-27 specification and verify authenticity of the improved model. It argues that Maria has the ability to analyze and verify sophisticated security protocols. Furthermore, it can be widely applied for automated analysis and verification of security protocol.

petrl net security protocol Maria analysis and verification

Yan Wang Jiantao Zhou Hua Li Ying Hao

Inner Mongolia University College of Computer Science, Huhhot 010021, Inner Mongolia, China Inner Mo Inner Mongolia University College of Computer Science, Huhhot 010021, Inner Mongolia, China

国际会议

The 2010 International Conference on Computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)

太原

英文

400-405

2010-10-22(万方平台首次上网日期,不代表论文的发表时间)