• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Yu, Wang Yadi, Han Jihong, Fan Yudan, and Zhang Chao. A Formal Model for Cryptographic Protocols Based on Planning Theory[J]. Journal of Computer Research and Development, 2008, 45(9).
Citation: Zhao Yu, Wang Yadi, Han Jihong, Fan Yudan, and Zhang Chao. A Formal Model for Cryptographic Protocols Based on Planning Theory[J]. Journal of Computer Research and Development, 2008, 45(9).

A Formal Model for Cryptographic Protocols Based on Planning Theory

More Information
  • Published Date: September 14, 2008
  • Planning theory is brought into the area of formal analysis for cryptographic protocols. Based on the running characteristics and laws of cryptographic protocols in the real networks, an attack planning theory for cryptographic protocols is presented, and a formal model, namely attack planning problem model of cryptographic protocols, is established for verifying the security properties of cryptographic protocols, including its first-order syntax, formal definitions and operational semantics. Meanwhile, the shortages of classical Dolev-Yao model are analyzed, and then the Dolev-Yao model is improved based on the basic message element strategy, which avoids the occurrences of “state space explosion” problem and enhances the completeness of attack planning problem model of cryptographic protocols. The feasibility of the improved Dolev-Yao model is guaranteed by extending the semantic of application. Finally, an instance for analyzing the NS public-key protocol based on the attack planning problem model is shown to illustrate the model utility. The formal model for cryptographic protocols presented, whose purpose is to verify cryptographic protocols and find the faults existing in them, is to prove faultiness, and can be conveniently used for both manual deductions and automatic implementations.
  • Related Articles

    [1]Li Chen, Chen Yidong, Lu Zhonghua, Yang Xueying, Wang Zitian, Chi Xuebin. A Parallel Multi-Objective Dividing Rectangles Algorithm Based on Normalized Decomposition[J]. Journal of Computer Research and Development, 2024, 61(11): 2909-2922. DOI: 10.7544/issn1000-1239.202330093
    [2]Liu Quan, Fu Qiming, Yang Xudong, Jing Ling, Li Jin, Li Jiao. A Scalable Parallel Reinforcement Learning Method Based on Intelligent Scheduling[J]. Journal of Computer Research and Development, 2013, 50(4): 843-851.
    [3]Zhou Hanxun, Zhao Hong, Wen Yingyou. Modeling and Analysis of Divide-and-Rule-Hybrid-Benign Worms[J]. Journal of Computer Research and Development, 2009, 46(7): 1110-1116.
    [4]Li Jianfu, Guo Maozu, and Liu Yang. An Evolutionary Tree Reconstruction Method Combining Quartet Puzzling and Neighbor Joining[J]. Journal of Computer Research and Development, 2008, 45(11): 1965-1973.
    [5]Li Kenli, Liu Jie, Yang Lei, Liu Wenbin. An O(1.414\+n) Volume Molecular Solutions for the Exact Cover Problem on DNA-Based Supercomputing[J]. Journal of Computer Research and Development, 2008, 45(10): 1782-1788.
    [6]Wang Li, Zhang Suwei, Li Zhansheng, Song Linjian. A Multi-Path Routing Protocol Based on Divide and Conquer Strategy in Ad Hoc Network[J]. Journal of Computer Research and Development, 2008, 45(1).
    [7]Lin Jiao, Wang Shanying, Wang Chongyu. A Study of Parallel DVM-DAC Algorithm in Multiscale Physics[J]. Journal of Computer Research and Development, 2007, 44(10): 1667-1672.
    [8]Li Kenli, Yao Fengjuan, Li Renfa, Xu Jin. Improved Molecular Solutions for the Knapsack Problem on DNA-Based Supercomputing[J]. Journal of Computer Research and Development, 2007, 44(6): 1063-1070.
    [9]He Lijian and Zhang Wei. An Agent Organization Structure for Solving DCOP Based on the Partitions of Constraint Graph[J]. Journal of Computer Research and Development, 2007, 44(3).
    [10]Hou Yuexian, Ding Zheng, and He Pilian. Self-Organizing Isometric Embedding[J]. Journal of Computer Research and Development, 2005, 42(2): 188-195.

Catalog

    Article views (462) PDF downloads (412) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return