Dissertation > Excellent graduate degree dissertation topics show

Study on Formal Analysis of Security Protocol Based on Strand Space Model

Author: ChengNa
Tutor: HeDaKe
School: Southwest Jiaotong University
Course: Cryptography
Keywords: Security protocol Formal Analysis Strand Space Model Fairness Proxy multi-signature
CLC: TP393.8
Type: Master's thesis
Year: 2006
Downloads: 93
Quote: 0
Read: Download Dissertation

Abstract


With the booming popularity of the network , as well as e-commerce and e-government network security issues become increasingly prominent. Security protocols , it is becoming increasingly important , as the most effective way to solve the security problems . However , in the complex network environment , to ensure the correctness of security protocols is difficult to solve the problem , it has become an important research topic . 20 years , in order to respond to this challenge , scientists in security protocol analysis in this area and put a lot of effort . The outcome of the formal analysis method is more prominent in the existing theories and methods . Formal analysis method , is generally regarded as the most promising of the latest research results Strand Space model proposed by Fabrega, Herzog and Guttman trio . It has fully absorbed the results of previous studies , a causal relationship between the use of a node to the diagram to represent The agreements subject intruder action sequences using proven methods to derive the correctness of the protocol , you can prevent the state space explosion . It is an intuitive , simple, strict and effective formal analysis methods . This article studies the Strand Space theory and the theoretical analysis of certain agreements : 1. The Yahalom agreement . The Yahalom protocol Strand Space model , and conducted in-depth discussions ; 2 . Certification of a transport model agreement . Strand Space model by analyzing the agreement , the discovery protocol loopholes , and construct a method of attack has been improved , and finally for the loopholes in the agreement ; 3 . ISI pay agreement . Of Strand Space theory applied to e-commerce protocol fairness analysis to obtain consistent results with other analysis methods . In addition, the part of the basic theory of proxy multi-signature study proposed an enhanced proxy multi-signature scheme .

Related Dissertations

  1. The Comparison and Contrast between the Health Care System in the United Kingdom and That in the United States,R199
  2. Research on Fairness and Justice under the Vision of Harmonious Society,D61
  3. Fairness Research of Entrance Examination System Since 1978,G632.474
  4. A Study of the Influence of Social Emotions and Social Norm on Fairness Behavior in Dictator Game,B842.6
  5. The Research on Fair Justice Ideological of Hu Jin Tao,D61
  6. Citizen participation in local tax department performance evaluation studies,F812.42
  7. Research on Education Fairness in Rural Areas,G521
  8. Research and Improvement on TCP Performance in Heterogeneous Wireless Networks,TN929.5
  9. Discuss the Administrative Hearing System of China and Perfection,D922.1
  10. Research on Dynamic Resource Allocation Strategies for TD-LTE System,TN929.5
  11. Research on Congestion Control Mechanism of Stream Control Transmission Protocol,TN915.04
  12. Research on Dynamic Resources Allocation of Multi-user CR-OFDM System,TN919.3
  13. Research on the Quality of Service Technology in IP Network,TN915.09
  14. Fairness preferences and bounded rationality under flexible contract design and optimization,F224
  15. Theoretical study of distributive justice,B82-05
  16. IAD research,D922.284
  17. Simple Procedure of Administrative Litigation,D925.3
  18. Pervasive Computing Research dynamically update its formal,TP338
  19. Analyzing the Influence of Farmers’ Credit Availability on the Sense of Social Justice,F224
  20. Research on the Security Protocol of Air Interface for RFID System,TP391.44
  21. On Fairness Evaluation for Road Traffic System,U491

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network
© 2012 www.DissertationTopic.Net  Mobile