安全协议形式化分析研究

Translated title of the contribution: A survey on formal analysis of security protocols

Shang Gao, Ai Qun Hu, Le Shi, Xian Bang Chen

Research output: Journal article publicationReview articleAcademic researchpeer-review

3 Citations (Scopus)

Abstract

Security protocols are basis for computer network security, and provide important secure insurance for information exchanging. It may cause great threat to the information security such as data leakage and fraudulent identity when there are flaws in security protocols. Therefore, it has always been a hot research area for the security of these protocols. The nowadays study for them is mainly through formal analysis. It can be classified into three types for theses protocols analysis; they are the model logic axiomatic technology, the model checking technology and the theorem proving technology. Each technology uses different ideas and lays different emphasis for each type. For each technology, researches also propose different methods and improvements for classic methods to improve the accuracy of formal analysis. For composed protocols, the main problem is to merge several secure protocols into one new protocol and ensure its security at the same time. In this paper, we first make a survey on various kinds of method in different analysis technologies, and conclude advantages and disadvantages of each method. Furthermore, we make an overview of the security analysis for composed protocols. Finally, we point out several problems and some research directions for further study in formal analysis of security protocols.

Translated title of the contributionA survey on formal analysis of security protocols
Original languageChinese (Simplified)
Pages (from-to)504-512
Number of pages9
JournalJournal of Cryptologic Research
Volume1
Issue number5
DOIs
Publication statusPublished - 30 Oct 2014
Externally publishedYes

Keywords

  • Composed protocols
  • Formal analysis
  • Security protocols

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Applied Mathematics
  • Computational Mathematics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A survey on formal analysis of security protocols'. Together they form a unique fingerprint.

Cite this