![網(wǎng)絡(luò)安全認(rèn)證協(xié)議形式化分析課件_第1頁(yè)](http://file4.renrendoc.com/view/bfac1854b9ea0552cb770094e2da94e6/bfac1854b9ea0552cb770094e2da94e61.gif)
![網(wǎng)絡(luò)安全認(rèn)證協(xié)議形式化分析課件_第2頁(yè)](http://file4.renrendoc.com/view/bfac1854b9ea0552cb770094e2da94e6/bfac1854b9ea0552cb770094e2da94e62.gif)
![網(wǎng)絡(luò)安全認(rèn)證協(xié)議形式化分析課件_第3頁(yè)](http://file4.renrendoc.com/view/bfac1854b9ea0552cb770094e2da94e6/bfac1854b9ea0552cb770094e2da94e63.gif)
![網(wǎng)絡(luò)安全認(rèn)證協(xié)議形式化分析課件_第4頁(yè)](http://file4.renrendoc.com/view/bfac1854b9ea0552cb770094e2da94e6/bfac1854b9ea0552cb770094e2da94e64.gif)
![網(wǎng)絡(luò)安全認(rèn)證協(xié)議形式化分析課件_第5頁(yè)](http://file4.renrendoc.com/view/bfac1854b9ea0552cb770094e2da94e6/bfac1854b9ea0552cb770094e2da94e65.gif)
版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
網(wǎng)絡(luò)安全認(rèn)證協(xié)議形式化分析2021/6/101網(wǎng)絡(luò)安全認(rèn)證協(xié)議形式化分析2021/6/101OrganizationIntroductionRelatedWorkFormalSystemNotationIntrudersAlgorithmicKnowledgeLogicVerificationUsingSPIN/PromelaConclusion2021/6/102OrganizationIntroduction2021/Introduction
Cryptographicprotocolsareprotocolsthatusecryptographytodistributekeysandauthenticateprincipalsanddataoveranetwork.Formalmethods,acombinationofamathematicalorlogicalmodelofasystemanditsrequirements,togetherwithaneffectiveprocedurefordeterminingwhetheraproofthatasystemsatisfiesitsrequirementsiscorrect.Model;Requirement(Specification);Verification.
2021/6/103Introduction2021/6/103Introduction
(cont.)Incryptographicprotocols,itisverycrucialtoensure:Messagesmeantforaprincipalcannotberead/accessedbyothers(secrecy);Guaranteegenuinenessofthesenderofthemessage(authenticity);Integrity;Non-Repudiation(NRO,NRR);Fairness,etc.
2021/6/104Introduction(cont.)IncryptoRelatedWorkTechniquesofverifyingsecuritypropertiesofthecryptographicprotocolscanbebroadlycategorized:methodsbasedonbelieflogics(BANLogic)π-calculusbasedmodelsstatemachinemodels(ModelChecking)
Modelcheckingadvantages(comparewiththeoryproving):automatic;counterexampleifviolationUseLTL(Lineartemporallogic)tospecifyproperties
FDR(Lowe);Mur(Mitchell);
Interrogator(Millen);Brutus(Marrero)
SPIN(Hollzmann)theoremproverbasedmethods(NRL,Meadows)methodsbasedonstatemachinemodelandtheoremprover(Athena,Dawn)TypecheckingISCAS,LOIS,…(inChina)2021/6/105RelatedWorkTechniquesofveriNotation(1)Messages
a
∈Atom::=C|N|k|
m
∈
Msg::=a|m?
m|{m}k(2)Contain
Relationship(?)m?a?m=am?m1?m2
?m=m1?m2∨m?m1∨m?m2m?{m1}k
?m={m1}k
∨m?m1Submessage:sub-msgs(m)?{m’∈
Msg|
m’?m}
2021/6/106Notation(1)Messages2021/6/106Notation(3)Derivation(?,Dolev-Yaomodel)
m∈B?B?mB?m∧B?m’?B?m?m’(pairing)B?m?m’?B?m∧B?m’(projection)B?m∧B?k?B?{m}k(encryption)B?{m}k
∧B?k-1
?B?m(decryption)2021/6/107Notation(3)Derivation(?,DolNotation(4)
Properties
Lemma1.
B?m∧B?B’?B’?m
Lemma2.B?m’∧B∪{m’}?m?B?m
Lemma3.
B?m∧X?m∧B?X?(Y:Y∈
sub-msgs(m):X?Y∧B?Y)∧(b:b∈B:Y?b)∧(Z,k:Z∈Msg∧k
∈
Key:Y={Z}k∧B?k-1)Lemma4.
(k,b:k∈Key∧b∈B:k?b∧A?k∧A∪B?k)∨(z:z∈
sub-msgs(x):a?z∧A?z)∨(b:b∈B:a?b∧A?a)2021/6/108Notation(4)Properties2021/6LogicofAlgorithmicKnowledgeDefinition1.PrimitivepropositionsP0sforsecurity:p,q∈
P0s::=sendi(m)Principalisentmessagemrecvi(m)Principalireceivedmessagemhasi(m)Principalihasmessagem2021/6/109LogicofAlgorithmicKnowledgeLogicofAlgorithmicKnowledgeDefinition2.AninterpretedsecuritysystemS=(R,∏R),where∏Risasystemforsecurityprotocols,and∏RisthefollowinginterpretationoftheprimitivepropositionsinR.
∏R(r,m)(sendi(m))=trueiff
jsuchthatsend(j,m)∈
ri(m)
∏R(r,m)(recvi(m))=trueiffrecv(m)∈
ri(m)
∏R(r,m)(hasi(m))=trueiffm’suchthatm?m’andrecv(m’)∈
ri(m)2021/6/1010LogicofAlgorithmicKnowledgeLogicofAlgorithmicKnowledgeDefinition3.Aninterpretedalgorithmicsecuritysystem(R,∏R,A1,A2,…,An),whereRisasecuritysystem,and∏RistheinterpretationinR,Aiisaknowledgealgorithmforprincipali.
2021/6/1011LogicofAlgorithmicKnowledgeAlgorithmknowledgelogic
AiDY(hasi(m),l)?K=keyof(l)foreachrecv(m’)inldoifsubmsg(m,m’,K)thenreturn“Yes”return“No”submsg(m,m’,K)?ifm=m’thenreturntrueifm’is{m1}kandk-1∈
Kthenreturnsubmsg(m,m1,K)ifm’ism1.m2thenreturnsubmsg(m,m1,K)∨submsg(m,m2,K)returnfalse2021/6/1012AlgorithmknowledgelogicAiDYCont.getkeys(m,K)?ifm∈
Keythenreturn{m}ifm’is{m1}kandk-1∈
Kthenreturngetkeys(m1,K)ifm’ism1.m2thenreturngetkeys(m1,K)∪getkeys(m2,K)return{}keysof(l)?K←initkeys(l)loopuntilnochangeinKk←∪getkeys(m,K)(whenrecv(m)∈
l)returnK2021/6/1013Cont.getkeys(m,K)?ifm∈KeVerificationUsingSPIN/PromelaSPINisahighlysuccessfulandwidelyusedsoftwaremodel-checkingsystembasedon"formalmethods"fromComputerScience.Ithasmadeadvancedtheoreticalverificationmethodsapplicabletolargeandhighlycomplexsoftwaresystems.InApril2002thetoolwasawardedtheprestigiousSystemSoftwareAwardfor2001bytheACM.SPINusesahighlevellanguagetospecifysystemsdescriptions,includingprotocols,calledPromela(PROcessMEtaLAnguage).
2021/6/1014VerificationUsingSPIN/PromelBAN-YahalomProtocol
[1]A→B:A,Na[2]B→S:B,Nb,{A,Na}Kbs[3]S→A:Nb,{B,Kab,Na}Kas,{A,Kab,Nb}Kbs[4]A→B:{A,Kab,Nb}Kbs,{Nb}Kab2021/6/1015BAN-YahalomProtocol2021/6/10Attack1
(intruderimpersonatesBobtoAlice)α.1A→I(B):A,Naβ.1I(B)→A:B,Naβ.2A→I(S):A,Na’,{B,Na}Kasγ.2I(A)→S:A,Na,{B,Na}Kasγ.3S→I(B):Na,{A,Kab,Na}Kas,{B,Kab,Na}Kbsα.3I(S)→A:Ne,{B,Kab,Na}Kas,{A,Kab,Na}Kbsα.4A→I(B):{A,Kab,Nb}Kbs,{Ne}Kab
2021/6/1016Attack1(intruderimpersonateAttack2
(intruderimpersonatesAlice)α.1A→B:A,Naα.2B→S:B,Nb,{A,Na}Kbsβ.1I(A)→B:A,(Na,Nb)β.2B→I(S):B,Nb’,{A,Na,Nb}Kas
α.3(Omitted)α.4I(A)→B:{A,Na,Nb}Kbs,{Nb}Na
2021/6/1017Attack2(intruderimpersonateAttack3α.1A→B:A,Naα.2B→S:B,Nb,{A,Na}Kbsβ.1I(B)→A:B,Nbβ.2A→I(S):A,Na’,{B,Nb}Kasγ.2I(A)→S:A,Na,{B,Nb}Kasβ.3S→I(B):Na,{A,Kab’,Nb}Kbs,{B,Kab’,Na}Kasδ.3I(S)→A:Nb,{B,Kab’,Na}Kas,{A,Kab’,Nb}Kbsα.4A→B:{A,Kab’,Nb}Kbs,{Nb}Kab’2021/6/1018Attack3α.1A→B:A,Na2021/6/Optimizationstrategies
UsingstaticanalysisandsyntacticalreorderingtechniquesThetwotechniquesareillustratedusingBAN-Yahalomverificationmodelasthebenchmark.describethemodelasOriginalversiontowhichstaticanalysisandthesyntacticalreorderingtechniquesarenotapplied,thestaticanalysistechniqueisonlyusedasFixedversion(1),boththestaticanalysisandthesyntacticalreorderingtechniquesareusedasFixedversion(2).2021/6/1019Optimizationstrategies2021ExperimentalresultsshowtheeffectivenessProtocolModelConfigurationWithtypeflawsNotypeflawsStatesTrans.StatesTrans.Originalversion15802065549697Fixedversion(1)7121690405379Fixedversion(2)4335122252432021/6/1020ExperimentalresultsshowtheNeedham-SchroederAuthenticationProtocol
2021/6/1021Needham-SchroederAuthenticatiAttacktoN-SProtocol(foundbySPIN)2021/6/1022AttacktoN-SProtocol(foundConclusionbasedonalogicofknowledgealgorithm,aformaldescriptionoftheintrudermodelunderDolev-Yaomodelisconstructed;astudyonverifyingthesecurityprotocolsfollowingaboveusingmodelcheckerSPIN,andthreeattackshavebeenfoundsuccessfullyinonlyonegeneralmodelaboutBAN-Yahalomprotocol;somesearchstrategiessuchasstaticanalysisandsyntacticalreorderingareappliedtoreducethemodelcheckingcomplexityandtheseapproacheswillbenefittheanalysisofmoreprotocols.ScalibilityInanycase,havingalogicwherewecanspecifytheabilitiesofintrudersisanecessaryprerequisitetousingmodel-checkingtechniques.
2021/6/1023Conclusionbasedonalogicof
Thanks!2021/6/10242021/6/1024問(wèn)題解答?2021/6/1025問(wèn)題解答?2021/6/1025網(wǎng)絡(luò)安全認(rèn)證協(xié)議形式化分析2021/6/1026網(wǎng)絡(luò)安全認(rèn)證協(xié)議形式化分析2021/6/101OrganizationIntroductionRelatedWorkFormalSystemNotationIntrudersAlgorithmicKnowledgeLogicVerificationUsingSPIN/PromelaConclusion2021/6/1027OrganizationIntroduction2021/Introduction
Cryptographicprotocolsareprotocolsthatusecryptographytodistributekeysandauthenticateprincipalsanddataoveranetwork.Formalmethods,acombinationofamathematicalorlogicalmodelofasystemanditsrequirements,togetherwithaneffectiveprocedurefordeterminingwhetheraproofthatasystemsatisfiesitsrequirementsiscorrect.Model;Requirement(Specification);Verification.
2021/6/1028Introduction2021/6/103Introduction
(cont.)Incryptographicprotocols,itisverycrucialtoensure:Messagesmeantforaprincipalcannotberead/accessedbyothers(secrecy);Guaranteegenuinenessofthesenderofthemessage(authenticity);Integrity;Non-Repudiation(NRO,NRR);Fairness,etc.
2021/6/1029Introduction(cont.)IncryptoRelatedWorkTechniquesofverifyingsecuritypropertiesofthecryptographicprotocolscanbebroadlycategorized:methodsbasedonbelieflogics(BANLogic)π-calculusbasedmodelsstatemachinemodels(ModelChecking)
Modelcheckingadvantages(comparewiththeoryproving):automatic;counterexampleifviolationUseLTL(Lineartemporallogic)tospecifyproperties
FDR(Lowe);Mur(Mitchell);
Interrogator(Millen);Brutus(Marrero)
SPIN(Hollzmann)theoremproverbasedmethods(NRL,Meadows)methodsbasedonstatemachinemodelandtheoremprover(Athena,Dawn)TypecheckingISCAS,LOIS,…(inChina)2021/6/1030RelatedWorkTechniquesofveriNotation(1)Messages
a
∈Atom::=C|N|k|
m
∈
Msg::=a|m?
m|{m}k(2)Contain
Relationship(?)m?a?m=am?m1?m2
?m=m1?m2∨m?m1∨m?m2m?{m1}k
?m={m1}k
∨m?m1Submessage:sub-msgs(m)?{m’∈
Msg|
m’?m}
2021/6/1031Notation(1)Messages2021/6/106Notation(3)Derivation(?,Dolev-Yaomodel)
m∈B?B?mB?m∧B?m’?B?m?m’(pairing)B?m?m’?B?m∧B?m’(projection)B?m∧B?k?B?{m}k(encryption)B?{m}k
∧B?k-1
?B?m(decryption)2021/6/1032Notation(3)Derivation(?,DolNotation(4)
Properties
Lemma1.
B?m∧B?B’?B’?m
Lemma2.B?m’∧B∪{m’}?m?B?m
Lemma3.
B?m∧X?m∧B?X?(Y:Y∈
sub-msgs(m):X?Y∧B?Y)∧(b:b∈B:Y?b)∧(Z,k:Z∈Msg∧k
∈
Key:Y={Z}k∧B?k-1)Lemma4.
(k,b:k∈Key∧b∈B:k?b∧A?k∧A∪B?k)∨(z:z∈
sub-msgs(x):a?z∧A?z)∨(b:b∈B:a?b∧A?a)2021/6/1033Notation(4)Properties2021/6LogicofAlgorithmicKnowledgeDefinition1.PrimitivepropositionsP0sforsecurity:p,q∈
P0s::=sendi(m)Principalisentmessagemrecvi(m)Principalireceivedmessagemhasi(m)Principalihasmessagem2021/6/1034LogicofAlgorithmicKnowledgeLogicofAlgorithmicKnowledgeDefinition2.AninterpretedsecuritysystemS=(R,∏R),where∏Risasystemforsecurityprotocols,and∏RisthefollowinginterpretationoftheprimitivepropositionsinR.
∏R(r,m)(sendi(m))=trueiff
jsuchthatsend(j,m)∈
ri(m)
∏R(r,m)(recvi(m))=trueiffrecv(m)∈
ri(m)
∏R(r,m)(hasi(m))=trueiffm’suchthatm?m’andrecv(m’)∈
ri(m)2021/6/1035LogicofAlgorithmicKnowledgeLogicofAlgorithmicKnowledgeDefinition3.Aninterpretedalgorithmicsecuritysystem(R,∏R,A1,A2,…,An),whereRisasecuritysystem,and∏RistheinterpretationinR,Aiisaknowledgealgorithmforprincipali.
2021/6/1036LogicofAlgorithmicKnowledgeAlgorithmknowledgelogic
AiDY(hasi(m),l)?K=keyof(l)foreachrecv(m’)inldoifsubmsg(m,m’,K)thenreturn“Yes”return“No”submsg(m,m’,K)?ifm=m’thenreturntrueifm’is{m1}kandk-1∈
Kthenreturnsubmsg(m,m1,K)ifm’ism1.m2thenreturnsubmsg(m,m1,K)∨submsg(m,m2,K)returnfalse2021/6/1037AlgorithmknowledgelogicAiDYCont.getkeys(m,K)?ifm∈
Keythenreturn{m}ifm’is{m1}kandk-1∈
Kthenreturngetkeys(m1,K)ifm’ism1.m2thenreturngetkeys(m1,K)∪getkeys(m2,K)return{}keysof(l)?K←initkeys(l)loopuntilnochangeinKk←∪getkeys(m,K)(whenrecv(m)∈
l)returnK2021/6/1038Cont.getkeys(m,K)?ifm∈KeVerificationUsingSPIN/PromelaSPINisahighlysuccessfulandwidelyusedsoftwaremodel-checkingsystembasedon"formalmethods"fromComputerScience.Ithasmadeadvancedtheoreticalverificationmethodsapplicabletolargeandhighlycomplexsoftwaresystems.InApril2002thetoolwasawardedtheprestigiousSystemSoftwareAwardfor2001bytheACM.SPINusesahighlevellanguagetospecifysystemsdescriptions,includingprotocols,calledPromela(PROcessMEtaLAnguage).
2021/6/1039VerificationUsingSPIN/PromelBAN-YahalomProtocol
[1]A→B:A,Na[2]B→S:B,Nb,{A,Na}Kbs[3]S→A:Nb,{B,Kab,Na}Kas,{A,Kab,Nb}Kbs[4]A→B:{A,Kab,Nb}Kbs,{Nb}Kab2021/6/1040BAN-YahalomProtocol2021/6/10Attack1
(intruderimpersonatesBobtoAlice)α.1A→I(B):A,Naβ.1I(B)→A:B,Naβ.2A→I(S):A,Na’,{B,Na}Kasγ.2I(A)→S:A,Na,{B,Na}Kasγ.3S→I(B):Na,{A,Kab,Na}Kas,{B,Kab,Na}Kbsα.3I(S)→A:Ne,{B,Kab,Na}Kas,{A,Kab,Na}Kbsα.4A→I(B):{A,Kab,Nb}Kbs,{Ne}Kab
2021/6/1041Attack1(intruderimpersonateAttack2
(intruderimpersonatesAlice)α.1A→B:A,Naα.2B→S:B,Nb,{A,Na}Kbsβ.1I(A)→B:A,(Na,Nb)β.2B→I(S):B,Nb’,{A,Na,Nb}Kas
α.3(Omitted)α.4I(A)→B:{A,Na,Nb}Kbs,{Nb}Na
2021/6/1042Attack2(intruderimpersonateAttack3α.1A→B:A,Naα.2B→S:B,Nb,{A,Na}Kbsβ.1I(B)→A:B,Nbβ.2A→I(S):A,Na’,{B,Nb}Kasγ.2I(A)→S:A,Na,{B,Nb}Kasβ.3S→I(B):Na,{A,Kab’,Nb}Kbs,{B,Kab’,Na}Kasδ.3I(S)→A:Nb,{B,Kab’,Na}Kas,{A,Kab’,Nb}Kbsα.4A→B:{A,Kab’,Nb}Kbs,{Nb}Kab’2021/6/1043Attack3α.1A→B:A,Na2021/6/Optimizationstrate
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 【滬教版】三年級(jí)上冊(cè)數(shù)學(xué)試題-整十?dāng)?shù)、整百數(shù)的除法(含答案)-
- 浙教版數(shù)學(xué)七年級(jí)上冊(cè)2.5《有理數(shù)的乘方》(第1課時(shí))聽(tīng)評(píng)課記錄
- 華師大版數(shù)學(xué)九年級(jí)上冊(cè)《解直角三角形》聽(tīng)評(píng)課記錄5
- 人教版歷史七年級(jí)上冊(cè)(2016年新編)《第8課百家爭(zhēng)鳴》(聽(tīng)課評(píng)課記錄)
- 2025年度減肥產(chǎn)品進(jìn)口與分銷(xiāo)合同
- 2025年度環(huán)保型空壓機(jī)銷(xiāo)售與改造合同
- 2025年度股權(quán)質(zhì)押借款合同法務(wù)審查要點(diǎn)
- 華師大版數(shù)學(xué)七年級(jí)下冊(cè)《幾何類(lèi)應(yīng)用問(wèn)題》聽(tīng)評(píng)課記錄2
- 2025年度企業(yè)安全生產(chǎn)與應(yīng)急預(yù)案咨詢(xún)服務(wù)合同范本
- 滬科版數(shù)學(xué)九年級(jí)下冊(cè)26.2《等可能情形下的概率計(jì)算》聽(tīng)評(píng)課記錄1
- 《字體設(shè)計(jì)》模塊五 裝飾性變化設(shè)計(jì)技巧的訓(xùn)練
- 《摔跤吧爸爸》觀后感PPT
- FRENIC 5000G11S、P11S富士變頻器操作說(shuō)明書(shū)
- 機(jī)構(gòu)編制重要事項(xiàng)的報(bào)告范文(5篇)
- DBJ51-T 188-2022 預(yù)拌流態(tài)固化土工程應(yīng)用技術(shù)標(biāo)準(zhǔn)
- 《長(zhǎng)津湖》電影賞析PPT
- Q-GDW 11274-2014 風(fēng)電無(wú)功電壓自動(dòng)控制技術(shù)規(guī)范
- GB/T 18838.3-2008涂覆涂料前鋼材表面處理噴射清理用金屬磨料的技術(shù)要求第3部分:高碳鑄鋼丸和砂
- CPR和AED培訓(xùn)考核試題附答案
- 多維閱讀第10級(jí) who is who 看看都是誰(shuí)
- 滑雪運(yùn)動(dòng)介紹
評(píng)論
0/150
提交評(píng)論