Dissertation > Excellent graduate degree dissertation topics show

Analysis and Studying of Authentication Protocols

Author: YuanJianTing
Tutor: LiuXiYang
School: Xi'an University of Electronic Science and Technology
Course: Computer System Architecture
Keywords: Authentication Protocol Formal Methods Model Checking NuSMV Design method
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 37
Quote: 1
Read: Download Dissertation


Authentication protocol occupies a very important position in network security , and for the design and analysis of authentication protocol are very difficult . If the authentication protocol is analyzed by verifying the existing means of attack , the main problem is we can not exhaust all types of attacks . So we turn to formal methods . Model checking technology has been proven to be successful protocol analysis method . We verify authentication protocol using model checking tool NuSMV , NuSMV support linear temporal logic . In addition, we use research Gavin Lowe , If you want to verify agreement to meet some preconditions and no attack on a small system model , did not attack any system , that is , of this agreement , the model the detection is complete . We modify some agreement to make it meet some preconditions \By modifying the process of the authentication protocol , we propose a new design method of authentication protocol . The authentication protocol is designed in this way out of the model of the small system is safe , then we are convinced that it is safe . Under the guidance of the design thinking and design a new Test protocols , NuSMV verification , validation results it is safe.

Related Dissertations

  1. Research on the Methods for Detecting Mismatch of Web Services Based on Bounded Model Checking,TP311.52
  2. A Study on the Application of Traditional Module Ideology in Landscape Form Design,TU986
  3. Mothods for Utilizing L System Theory to Design Home Textile Simplisim Style,J504
  4. Research on the Low-cost RFID Systems Security Protocol,TP391.44
  5. Research on a Secure E-Commerce Payment Protocol Based on Four Parties,TP393.08
  6. Research of Clamp Mechanism Design Process and Properties Based on the Elementary Method,TH21
  7. The High Voltage Generation System Design in Nano-Crystal Memory,TN47
  8. VoIP Security Mechamism Research and Implementation Based on the Mobile Network,TN916.2
  9. RFID Authentication Protocol Based on Hash Function,TP391.44
  10. Research on Secure and Trusted Video Sensor Node,TN929.5
  11. Security and Privacy Protection of Mobile RFID Conforming to EPCC1GEN2,TP391.44
  12. Research of the Security Authentication Protocol for RFID Systems,TP391.44
  13. IPsec-based remote access to corporate network systems design and implementation,TP393.08
  14. Major component characteristics of the web opening degree Kong Houqiang,U661.43
  15. High - speed railway bridges mitigation and isolation,U442.55
  16. Key Technology Research for Asphalt Pavement Ultra-thin Overlay,U416.217
  17. Research on the Void Prediction of Cement Concrete Overly on Old Cement Pavement after Rubblization,U414
  18. Research on Stability of Prestress Concrete Composite Box Girder with Corrugated Steel Webs,U448.213
  19. Static Behavior Analysis of Concrete-filled Steel Trussed Arch Bridge with Rectangular Hollow Section,U441
  20. EPS Load Reduction Technology Application Research for High Fill Culvert,U449
  21. Research of the Highway Landscape Design Based on Visual Characteristics,U418.9

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile