• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Huawei and Li Daxing. A Security Protocols' Analytic Approach of Reconciling Two Views[J]. Journal of Computer Research and Development, 2006, 43(7): 1260-1266.
Citation: Zhao Huawei and Li Daxing. A Security Protocols' Analytic Approach of Reconciling Two Views[J]. Journal of Computer Research and Development, 2006, 43(7): 1260-1266.

A Security Protocols' Analytic Approach of Reconciling Two Views

More Information
  • Published Date: July 14, 2006
  • The symbol approach and the computational approach are two different approaches in security protocols' formal analysis, but the former is quite alien to the latter. The former regards protocols as a set of symbols and believes that cryptography has a secure property of “all-or-nothing”; the latter regards protocols as a set of strings, and considers that cryptography is not strong enough to resist adversary's attack. Because each approach has flaws and virtues, an idea is brought forward that is engaged in drawing virtues from both approaches and discarding their flaws to build a mature approach to analyze security protocols. A new analytic approach reconciling the two approaches is constructed following this idea. The new approach defines the security as the completeness and the correctness, through analyzing them. It not only can examine whether protocols could reach the expectant goals, but also can compute adversary's aggressive ability to protocols. The approach is the first one which puts forward the idea that analyzes security protocols from logistic reliability and cryptographic reliability.
  • Related Articles

    [1]Yang Guang, Zhou Yu, Chen Xiang, Zhang Xiangyu. CodeScore-R: An Automated Robustness Metric for Assessing the Functional Correctness of Code Synthesis[J]. Journal of Computer Research and Development, 2024, 61(2): 291-306. DOI: 10.7544/issn1000-1239.202330715
    [2]Wang Yiting, Lan Yanyan, Pang Liang, Guo Jiafeng, Cheng Xueqi. Unbiased Learning to Rank Based on Relevance Correction[J]. Journal of Computer Research and Development, 2022, 59(12): 2867-2877. DOI: 10.7544/issn1000-1239.20210865
    [3]Zheng Yimei, Jia Caiyan, Chang Zhenhai, Li Xuanya. A Degree Corrected Stochastic Block Model for Attributed Networks[J]. Journal of Computer Research and Development, 2020, 57(8): 1650-1662. DOI: 10.7544/issn1000-1239.2020.20200158
    [4]Fu Liguo, Pang Jianmin, Wang Jun, Zhang Jiahao, Yue Feng. Formal Model of Correctness and Optimization on Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(9): 2001-2011. DOI: 10.7544/issn1000-1239.2019.20180513
    [5]Lin Weiwei, Yao Yingbiao, Zou Ke, Feng Wei, Yan Junrong. Correction Vector Based Distributed DV-Hop Localization Refinement Algorithm[J]. Journal of Computer Research and Development, 2019, 56(3): 585-593. DOI: 10.7544/issn1000-1239.2019.20170841
    [6]Ma Yanfang, Zhang Min, Chen Yixiang. Formal Description of Software Dynamic Correctness[J]. Journal of Computer Research and Development, 2013, 50(3): 626-635.
    [7]Jiang Yingying, Ao Xiang, Tian Feng, Wang Xugang, Dai Guozhong. Error Correction for Handwritten Mathematical Expression Recognition by Pen and Speech[J]. Journal of Computer Research and Development, 2009, 46(4): 689-697.
    [8]Dai Jinyou, Yu Shaohua. An Adaptive Forward Error Correction Method for Carrier Ethernet[J]. Journal of Computer Research and Development, 2009, 46(2): 239-244.
    [9]Ou Xinliang, Chen Songqiao, Chang Zhiming. A Parallel Geometric Correction Algorithm Based on Dynamic Division-Point Computing[J]. Journal of Computer Research and Development, 2006, 43(6): 1115-1121.
    [10]Li Jianjiang, Shu Jiwu, Chen Yongjian, Wang Dingxing, Zheng Weimin. A Mode for Developing OpenMP Programs Based on Dynamic Parallel Region[J]. Journal of Computer Research and Development, 2006, 43(3): 496-502.

Catalog

    Article views (739) PDF downloads (538) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return