DocumentCode :
2703068
Title :
Modeling and solving cryptographic protocol insecurity problem
Author :
Han, Jihong ; Zhao, Yu ; Fan, Yudan ; Zhao, Juan
Author_Institution :
Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou
fYear :
2008
fDate :
20-23 June 2008
Firstpage :
1757
Lastpage :
1761
Abstract :
In this paper, the insecurity problem of cryptographic protocol is proposed. To solve this problem, we give an accurate formal specifications for cryptographic protocols, and define the security properties precisely and reasonably, presenting some critical concepts and propositions in the deduction of the problem solving. The method of this paper with provable semantics is reasonable and sound, proved to be efficient by practice.
Keywords :
cryptographic protocols; formal specification; cryptographic protocol; formal specifications; insecurity problem; problem solving; Authentication; Automation; Computational modeling; Cryptographic protocols; Cryptography; Formal specifications; Information science; Problem-solving; Public key; Reactive power;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Automation, 2008. ICIA 2008. International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4244-2183-1
Electronic_ISBN :
978-1-4244-2184-8
Type :
conf
DOI :
10.1109/ICINFA.2008.4608290
Filename :
4608290
Link To Document :
بازگشت