Title :
Verification method of security protocols and its application
Author :
Chen, Li ; Li, Xiaoxue
Author_Institution :
Henan Univ. of Econ. & Law, Zhengzhou, China
Abstract :
The paper researches the typical logic verification methods of security protocols and points out their limitations. Most of them are lack of formal semantics and analysis ability to hybrid cryptography-based primitives. In response on the above-mentioned problems, the paper proposes a new logic verification method, which can analyze most of the known security properties of the e-commerce protocols, such as authentication, secrecy of key, non-repudiation, accountability, fairness and atomicity. The validation of the new logic is verified by analyzing the anonymous e-cash payment protocol and certificated E-mail delivery protocol. The analysis results reveal that the two protocols cannot satisfy the intended security goals.
Keywords :
cryptographic protocols; electronic commerce; electronic mail; formal verification; anonymous e-cash payment protocol; certificated e-mail delivery protocol; e-commerce protocols; formal semantics; hybrid cryptography based primitives; logic verification methods; security protocols verification method; Manufacturing; accountability; fairness; hybrid cryptography-based primitives; security property; verification logic;
Conference_Titel :
Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on
Conference_Location :
Xiamen
Print_ISBN :
978-1-4244-6582-8
DOI :
10.1109/ICICISYS.2010.5658265