诚实函数及其在密码协议分析中的应用

Alfred P. Maneki
{"title":"诚实函数及其在密码协议分析中的应用","authors":"Alfred P. Maneki","doi":"10.1109/CSFW.1999.779764","DOIUrl":null,"url":null,"abstract":"J.D. Guttman, et al. (1998) have introduced \"strand spaces\" as a technique for describing and analyzing cryptographic protocols (i.e. schemes for exchanging messages between legitimate agents in a communications system for purposes of authentication or establishing session keys). The strands of such a protocol are directly mapped to traces of the messages which are transmitted and received by each agent. Strands may also be associated with the possible traces of a penetrator. J.D. Guttman, et al. (1998) use simple graph theoretic constructions to describe the underlying relations between legitimate agents and the penetrator. These researchers also develop an \"algebra\" for the set of all possible messages which may be transmitted in a given cryptographic protocol. They have successfully used strand spaces to prove correctness properties of several cryptographic protocols. In this paper we extend the theory of strand spaces to include a broad class of cryptographic protocols which could not be analyzed in the original framework provided by Guttman, et al. This class includes the TMN (Roscose's version) and SSHV2 protocols, i.e., protocols which use the exclusive-or and exponential functions for message generation. In an intuitive manner we define the class of \"honest\" functions and extend the theory to include these functions. We conclude this paper with an analysis of the TMN protocol.","PeriodicalId":374159,"journal":{"name":"Proceedings of the 12th IEEE Computer Security Foundations Workshop","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Honest functions and their application to the analysis of cryptographic protocols\",\"authors\":\"Alfred P. Maneki\",\"doi\":\"10.1109/CSFW.1999.779764\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"J.D. Guttman, et al. (1998) have introduced \\\"strand spaces\\\" as a technique for describing and analyzing cryptographic protocols (i.e. schemes for exchanging messages between legitimate agents in a communications system for purposes of authentication or establishing session keys). The strands of such a protocol are directly mapped to traces of the messages which are transmitted and received by each agent. Strands may also be associated with the possible traces of a penetrator. J.D. Guttman, et al. (1998) use simple graph theoretic constructions to describe the underlying relations between legitimate agents and the penetrator. These researchers also develop an \\\"algebra\\\" for the set of all possible messages which may be transmitted in a given cryptographic protocol. They have successfully used strand spaces to prove correctness properties of several cryptographic protocols. In this paper we extend the theory of strand spaces to include a broad class of cryptographic protocols which could not be analyzed in the original framework provided by Guttman, et al. This class includes the TMN (Roscose's version) and SSHV2 protocols, i.e., protocols which use the exclusive-or and exponential functions for message generation. In an intuitive manner we define the class of \\\"honest\\\" functions and extend the theory to include these functions. We conclude this paper with an analysis of the TMN protocol.\",\"PeriodicalId\":374159,\"journal\":{\"name\":\"Proceedings of the 12th IEEE Computer Security Foundations Workshop\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1999-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 12th IEEE Computer Security Foundations Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSFW.1999.779764\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th IEEE Computer Security Foundations Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1999.779764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

J.D. Guttman等人(1998)引入了“链空间”作为描述和分析加密协议的技术(即通信系统中合法代理之间交换消息的方案,用于身份验证或建立会话密钥)。这种协议的链直接映射到每个代理发送和接收的消息的跟踪。线也可能与穿透剂的可能痕迹有关。J.D. Guttman等人(1998)使用简单的图论结构来描述合法代理和渗透者之间的潜在关系。这些研究人员还为在给定的加密协议中可能传输的所有可能的消息集开发了一个“代数”。他们已经成功地利用链空间证明了几种加密协议的正确性。在本文中,我们扩展了链空间理论,以包括在Guttman等人提供的原始框架中无法分析的广泛类别的加密协议。该类包括TMN (Roscose的版本)和SSHV2协议,即使用异或函数和指数函数生成消息的协议。我们以一种直观的方式定义了“诚实”函数类,并扩展了理论以包含这些函数。最后,我们对TMN协议进行了分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Honest functions and their application to the analysis of cryptographic protocols
J.D. Guttman, et al. (1998) have introduced "strand spaces" as a technique for describing and analyzing cryptographic protocols (i.e. schemes for exchanging messages between legitimate agents in a communications system for purposes of authentication or establishing session keys). The strands of such a protocol are directly mapped to traces of the messages which are transmitted and received by each agent. Strands may also be associated with the possible traces of a penetrator. J.D. Guttman, et al. (1998) use simple graph theoretic constructions to describe the underlying relations between legitimate agents and the penetrator. These researchers also develop an "algebra" for the set of all possible messages which may be transmitted in a given cryptographic protocol. They have successfully used strand spaces to prove correctness properties of several cryptographic protocols. In this paper we extend the theory of strand spaces to include a broad class of cryptographic protocols which could not be analyzed in the original framework provided by Guttman, et al. This class includes the TMN (Roscose's version) and SSHV2 protocols, i.e., protocols which use the exclusive-or and exponential functions for message generation. In an intuitive manner we define the class of "honest" functions and extend the theory to include these functions. We conclude this paper with an analysis of the TMN protocol.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信