• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学

• 论文 • 上一篇    下一篇

基于时间戳私钥签名技术的Nayak-T协议安全性分析

肖美华1,梅映天1,2,李伟1,李娅楠1,钟小妹1,宋子繁1   

  1. (1.华东交通大学软件学院,江西 南昌 330013;2.池州职业技术学院,安徽 池州 247100)
  • 收稿日期:2017-07-10 修回日期:2017-09-16 出版日期:2017-12-25 发布日期:2017-12-25
  • 基金资助:

    国家自然科学基金(61163005,61562026);江西省自然科学基金(20161BAB202063);江西省对外科技合作项目(20151BDH80005);江西省主要学科学术和技术带头人资助计划(2017BCB22015)

Security analysis of Nayak-T protocol
based on time stamp and private key signature

XIAO Mei-hua1,MEI Ying-tian1,2,LI Wei1,LI Ya-nan1,ZHONG Xiao-mei1,SONG Zi-fan1   

  1. (1.School of Software,East China Jiaotong University,Nanchang 330013;
    2.Chizhou Vocational and Technical College,Chizhou 247100,China)
     
  • Received:2017-07-10 Revised:2017-09-16 Online:2017-12-25 Published:2017-12-25

摘要:

随着信息网络的快速发展,云服务走进人们视野,云环境下信息安全问题成为人们关注的焦点。Nayak协议是一种云环境下基于口令身份认证,实现双向认证和会话密钥交换的协议。针对Nayak协议存在的中间人攻击,提出改进协议Nayak-T。Nayak-T协议在消息项内增加时间戳并更改加密手段,通过双重加密的手段来保证双方通信安全。利用四通道并行建模法对Nayak-T协议建模,运用SPIN对该协议进行验证,验证结果得出Nayak-T协议安全的结论。模型优化策略分析表明,采用静态分析、类型检查、语法重定序模型优化策略的模型检测效率最佳,可运用于类似复杂协议的形式化分析与验证。

关键词: Nayak协议, Nayak-T协议, 模型检测, 私钥签名, 时间戳

Abstract:

With the rapid development of information networks, cloud services step into people’s vision and the problems of information security in the cloud environment become a focus. Nayak protocol is a password authentication scheme based on the bidirectional authentication and session key agreement in the cloud environment. Targeting at man-in-the-middle attacks existing in Nayak protocol, we put forward an improved Nayak-T protocol. Nayak-T protocol adds in time stamp and changes their encryption ways inside message options to ensure the security of two-way communication through double encryption. We use the four channels parallel modeling method to model Nayak-T protocol and adopt SPIN to verify the security of this protocol. Analysis of modeling optimization strategies proves that the model testing that adopts static analysis, type checking and syntax reordering are most efficient. This method can be applied to the formal analysis and verification of similar complicated protocols.

 

 

Key words: Nayak protocol, Nayak-T protocol, model checking, private key signature, time stamp