Computer Engineering and Applications ›› 2007, Vol. 43 ›› Issue (21): 8-11.

• 博士论坛 • Previous Articles     Next Articles

Computational soundness of formal analysis of cryptographic protocols

WANG Quan-lai1,2,WANG Ya-di1,HAN Ji-hong1   

  1. 1.Institute of Electronic Technology,the PLA Information Engineering University,Zhengzhou 450004,China
    2.The PLA Air Defense Forces Command College,Zhengzhou 450052,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-07-21 Published:2007-07-21
  • Contact: WANG Quan-lai

密码协议形式化分析的计算合理性

王全来1,2,王亚弟1,韩继红1   

  1. 1.解放军信息工程大学 电子技术学院,郑州 450004
    2.解放军防空兵指挥学院,郑州 450052
  • 通讯作者: 王全来

Abstract: Based on the Abadi-Rowgaway computational soundness theorem of formal encryption,this paper proposes and proves our computational soundness theorem of formal analysis of cryptographic protocols.Through the analysis for group key distribution protocols,our soundness theorem is stronger and powerful in adaptive attacks.This paper proposes formal definitions of security for group key distribution protocols both in the formal methods and the computational methods,then proves soundness of the formal definition.

Key words: formal method, computational method, soundness theorem, cryptographic protocol analysis

摘要: 基于Abadi-Rowgaway的形式化加密的计算合理性定理,提出和证明了密码协议形式化分析的计算合理性定理。通过对群密钥分配协议安全性的分析,说明定理对协议的可选择攻击具有较强的分析能力,提出了群密钥分配协议的形式化方法与计算方法下安全性的形式化定义,并证明了其合理性。

关键词: 形式化方法, 计算方法, 合理性定理, 密码协议分析