Title :
Modeling and solving cryptographic protocol insecurity problem
Author :
Han, Jihong ; Zhao, Yu ; Fan, Yudan ; Zhao, Juan
Author_Institution :
Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou
Abstract :
In this paper, the insecurity problem of cryptographic protocol is proposed. To solve this problem, we give an accurate formal specifications for cryptographic protocols, and define the security properties precisely and reasonably, presenting some critical concepts and propositions in the deduction of the problem solving. The method of this paper with provable semantics is reasonable and sound, proved to be efficient by practice.
Keywords :
cryptographic protocols; formal specification; cryptographic protocol; formal specifications; insecurity problem; problem solving; Authentication; Automation; Computational modeling; Cryptographic protocols; Cryptography; Formal specifications; Information science; Problem-solving; Public key; Reactive power;
Conference_Titel :
Information and Automation, 2008. ICIA 2008. International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4244-2183-1
Electronic_ISBN :
978-1-4244-2184-8
DOI :
10.1109/ICINFA.2008.4608290