DocumentCode
498452
Title
Analyzing Cryptographic Protocols Using AI Planning Technology
Author
Wang, Yadi ; Zhou, Zhiyong ; Zhao, Yu ; Han, Jihong
Author_Institution
Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China
Volume
1
fYear
2009
fDate
22-24 May 2009
Firstpage
16
Lastpage
20
Abstract
In this paper, protocol insecurity problem is described, and AI planning system is used to solve the problem. Based on running characteristics and laws of cryptographic protocols, a planning-based formal model for cryptographic protocol analysis is presented, after its first-order syntax, formal definition and operational semantics are given, formalization for protocol honest agents, the intruder and protocol insecurity goals are presented, and a SAT-based solving algorithm for attack planning is proposed.
Keywords
cryptographic protocols; planning (artificial intelligence); artificial intelligence; cryptographic protocols; planning; protocol insecurity; Artificial intelligence; Cryptographic protocols; Cryptography; Electronic commerce; Information analysis; Information science; Information security; Public key; State-space methods; Technology planning; basic message element; cryptographic protocol; formalization; planning; protocol insecurity problem; solving algorithm;
fLanguage
English
Publisher
ieee
Conference_Titel
Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on
Conference_Location
Nanchang
Print_ISBN
978-0-7695-3643-9
Type
conf
DOI
10.1109/ISECS.2009.48
Filename
5209720
Link To Document