{"title":"基于彩色Petri网的TMN协议安全性分析:动态轨迹生成方法和同态性质","authors":"Y. Permpoontanalarp, Apichai Changkhanak","doi":"10.1109/JCSSE.2011.5930095","DOIUrl":null,"url":null,"abstract":"The TMN protocol is a secure key exchange protocol for mobile communication system. Its security has been analyzed thoroughly by many approaches, and many attacks have been found. Recently, we have developed a new Coloured Petri Net (CPN) approach to analyze cryptographic protocols, and then applied it to analyze the TMN protocol with the homomorphic property of the underlying public-key encryption. As preliminary analyses, we found two new attacks of the protocol. In this paper, we extend our previous works in two aspects. Firstly, we compare the performance between our new method and a traditional method to analyze attacks in cryptographic protocols. Surprisingly, our method is more efficient when the number of states and traces are large. Secondly, we found three new and interesting variants of our previous attacks.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security analysis of the TMN protocol by using Coloured Petri Nets: On-the-fly trace generation method and homomorphic property\",\"authors\":\"Y. Permpoontanalarp, Apichai Changkhanak\",\"doi\":\"10.1109/JCSSE.2011.5930095\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The TMN protocol is a secure key exchange protocol for mobile communication system. Its security has been analyzed thoroughly by many approaches, and many attacks have been found. Recently, we have developed a new Coloured Petri Net (CPN) approach to analyze cryptographic protocols, and then applied it to analyze the TMN protocol with the homomorphic property of the underlying public-key encryption. As preliminary analyses, we found two new attacks of the protocol. In this paper, we extend our previous works in two aspects. Firstly, we compare the performance between our new method and a traditional method to analyze attacks in cryptographic protocols. Surprisingly, our method is more efficient when the number of states and traces are large. Secondly, we found three new and interesting variants of our previous attacks.\",\"PeriodicalId\":287775,\"journal\":{\"name\":\"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JCSSE.2011.5930095\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JCSSE.2011.5930095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security analysis of the TMN protocol by using Coloured Petri Nets: On-the-fly trace generation method and homomorphic property
The TMN protocol is a secure key exchange protocol for mobile communication system. Its security has been analyzed thoroughly by many approaches, and many attacks have been found. Recently, we have developed a new Coloured Petri Net (CPN) approach to analyze cryptographic protocols, and then applied it to analyze the TMN protocol with the homomorphic property of the underlying public-key encryption. As preliminary analyses, we found two new attacks of the protocol. In this paper, we extend our previous works in two aspects. Firstly, we compare the performance between our new method and a traditional method to analyze attacks in cryptographic protocols. Surprisingly, our method is more efficient when the number of states and traces are large. Secondly, we found three new and interesting variants of our previous attacks.