计算机工程与应用 ›› 2007, Vol. 43 ›› Issue (21): 8-11.

• 博士论坛 • 上一篇    下一篇

密码协议形式化分析的计算合理性

王全来1,2,王亚弟1,韩继红1   

  1. 1.解放军信息工程大学 电子技术学院,郑州 450004
    2.解放军防空兵指挥学院,郑州 450052
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-07-21 发布日期:2007-07-21
  • 通讯作者: 王全来

Computational soundness of formal analysis of cryptographic protocols

WANG Quan-lai1,2,WANG Ya-di1,HAN Ji-hong1   

  1. 1.Institute of Electronic Technology,the PLA Information Engineering University,Zhengzhou 450004,China
    2.The PLA Air Defense Forces Command College,Zhengzhou 450052,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-07-21 Published:2007-07-21
  • Contact: WANG Quan-lai

摘要: 基于Abadi-Rowgaway的形式化加密的计算合理性定理,提出和证明了密码协议形式化分析的计算合理性定理。通过对群密钥分配协议安全性的分析,说明定理对协议的可选择攻击具有较强的分析能力,提出了群密钥分配协议的形式化方法与计算方法下安全性的形式化定义,并证明了其合理性。

关键词: 形式化方法, 计算方法, 合理性定理, 密码协议分析

Abstract: Based on the Abadi-Rowgaway computational soundness theorem of formal encryption,this paper proposes and proves our computational soundness theorem of formal analysis of cryptographic protocols.Through the analysis for group key distribution protocols,our soundness theorem is stronger and powerful in adaptive attacks.This paper proposes formal definitions of security for group key distribution protocols both in the formal methods and the computational methods,then proves soundness of the formal definition.

Key words: formal method, computational method, soundness theorem, cryptographic protocol analysis