[1]魏浩,解争龙,弋改珍.基于串空间理论的Kerberos协议分析[J].计算机技术与发展,2013,(12):109-112.
 WEI Hao,XIE Zheng-long,YI Gai-zhen.Analysis of Kerberos Protocol Based on Strand Space Theory[J].,2013,(12):109-112.
点击复制

基于串空间理论的Kerberos协议分析()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年12期
页码:
109-112
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
Analysis of Kerberos Protocol Based on Strand Space Theory
文章编号:
1673-629X(2013)12-0109-04
作者:
魏浩解争龙弋改珍
咸阳师范学院 信息工程学院
Author(s):
WEI HaoXIE Zheng-longYI Gai-zhen
关键词:
串空间Kerberos协议保密性认证性
Keywords:
string spaceKerberos protocolconfidentialityauthenticity
文献标志码:
A
摘要:
在介绍串空间理论基本概念、攻击者模型以及Kerberos协议的基础上,利用串空间理论得出Kerberos各协议参与主体和攻击者的迹,构造了协议的串空间,给出了Kerberos协议的丛图。在证明一个定理的基础上,使用启发式和反证法的思路,证明了认证服务器分配给客户端和应用服务器会话密钥的保密性,即攻击者从现有知识和构造能力无法推导出服务器分配给客户端和应用服务器的会话密钥;证明了客户端和认证服务器以及客户端和应用服务器能够相互认证,得出了Kerberos协议正确性的结论
Abstract:
Based on the theory of the string space,the model of the attacker and the Kerberos protocol,obtain traces of the subject in-volved in Kerberos protocol and the attacker with string space theory,and establish string space and bundles of the Kerberos protocol. It is proved that the session key of the client and application server assigned by authentication server is confidential by heuristic and reduction to absurdity. The attacker can not obtain the session key from existing knowledge and building capacity. The client and the authentication server and client and application server can be authenticated each other. It is concluded that the Kerberos protocol is correct

相似文献/References:

[1]董军 杨秀娟 赵艳芹.基于串空间模型安全协议形式化分析方法的研究[J].计算机技术与发展,2008,(04):151.
 DONG Jun,YANG Xiu-juan,ZHAO Yan-qin.Research on Formalisms Analysis Method Based on Strand Space Model Security Protocol[J].,2008,(12):151.
[2]范宏生 叶震 侯保花.基于公钥密码体制的Kerberos协议的改进[J].计算机技术与发展,2006,(04):224.
 FAN Hong-sheng,YE Zhen,HOU Bao-hua.Improvement of Kerberos Protocol Based on Public Key Cryptosystem[J].,2006,(12):224.
[3]周星,刘军,董春冻,等.基于身份的卫星网络密钥管理方案[J].计算机技术与发展,2013,(11):148.
 ZHOU Xing[],LIU Jun[],DONG Chun-dong[],et al.A Scheme of Identity-based Satellite Network Key Management[J].,2013,(12):148.

更新日期/Last Update: 1900-01-01